Data processing apparatus

ABSTRACT

Data processing apparatus is provided comprising one or more processors. The data processing apparatus may be configured to perform a method of determining authentication data for authenticating an object comprising one or more identification elements which are detectable when electromagnetic radiation is incident thereon. The method may comprise obtaining image data relating to one or more of the identification element(s) of the object, processing the image data to determine outline data relating to outline(s) of one or more of the identification element(s) to which the image data relates and determining the authentication data from the outline data.

FIELD OF INVENTION

The present invention relates to an apparatus, method, computer readablemedium and computer program for: determining authentication data forauthenticating an object; for generating or updating an authenticationdata store; for authenticating an object.

BACKGROUND OF THE INVENTION

WO2005/080088 describes a method of verifying whether an object isgenuine. An object with embedded fibres is provided, the embedded fibresemitting visible electromagnetic radiation when illuminated withultraviolet electromagnetic radiation. The fibres are randomlydistributed so that the object can be identified from the relativepositions of the fibres. In order to verify that the object is genuine,the object is illuminated with ultraviolet radiation and an image of theobject is taken by a camera. The image is then converted into anumerical code which is compared to corresponding numerical codes storedin a database. If the code matches one of the codes in the database, itcan be determined that the object is genuine. However, in order for thismethod to yield reproducible results, the image capture conditions underwhich the image of the object is captured should be tightly controlled,otherwise discrepancies between images can be too great for codesgenerated from them to be accurately compared. For example, for both thedetermination of the code to be stored in the database and the(typically later) determination of the code for comparison to the codesstored in the database, the object should be provided at a specificdistance from the camera, at a specific angle relative thereto. Inaddition, the camera equipment should be of the same specification andthe ambient lighting conditions under which the images are capturedshould be similar. This tight control of the conditions under which theimage is captured is not always easily achievable in practice, and canincrease the costs of implementing this type of object authenticationsystem.

Thus, improvements to the method of WO2005/080088 are desirable.

SUMMARY OF INVENTION

A first aspect of the invention provides data processing apparatus.Typically the data processing apparatus comprises one or moreprocessors. Typically the data processing apparatus is to perform amethod of determining authentication data for authenticating an objectcomprising one or more identification elements which are detectable(e.g. which are optically visible) when electromagnetic radiation isincident thereon. Typically the method comprises obtaining image datarelating to one or more of the said identification element(s) of theobject. Typically the method further comprises processing the image datato determine outline data relating to outline(s) of one or more of theidentification element(s) to which the said image data relates.Typically the method comprises determining the authentication data fromthe outline data.

A second aspect of the invention provides a method of determiningauthentication data for authenticating an object comprising one or moreidentification elements which are detectable (e.g. which are opticallyvisible) when electromagnetic radiation is incident thereon. Typicallythe method comprises obtaining image data relating to one or more of thesaid identification element(s) of the object. Typically the methodcomprises processing the image data to determine outline data relatingto outline(s) of one or more of the said identification element(s) towhich the said image data relates. Typically the method comprisesdetermining the authentication data from the outline data.

By determining the authentication data from the outline data rather thandirectly from the image data, authentication data can be determined moreconsistently and reproducibly, even when it is determined from imagedata captured under different lighting conditions or with differenttypes or specifications of image capture equipment, and even when it isdetermined from image data captured from different angles or fromdifferent distances from the object. This improves the authenticationsystem as a whole, making it both more reliable and easier to implementat least because stringent controls are not required over the imagecapture equipment used, the relative arrangement between the imagecapture equipment and the object or the ambient conditions under whichthe image data is captured.

It may be that the image data relates to an image of at least a portionof the object comprising the one or more identification elements towhich the image data relates.

It may be that the image data relating to one or more identificationelements of the object comprises image data derived from or representingan image of at least a portion of the object comprising at leastrespective portion(s) of the one or more identification elements towhich the image data relates.

It may be that the outline data relating to outline(s) of one or more ofthe identification element(s) to which the said image data relatescomprises outline data derived from or representing outline(s) of atleast respective portion(s) of one or more of the identificationelement(s) to which the said image data relates.

It may be that processing the image data to determine the outline datacomprises applying a thresholding algorithm to the image data, typicallyto thereby trace around the outer edge(s) of at least respectiveportion(s) of one or more of the identification element(s) to which theimage data relates. Typically the outline data relates to trace(s)around the outer edge(s) of at least respective portion(s) of one ormore of the identification element(s) to which the image data relates.It may be that the outline data represents trace(s) around the outeredge(s) of at least respective portion(s) of one or more of theidentification element(s) to which the image data relates.

It may be that the identification element(s) of the object aredetectable when visible, ultraviolet, infrared, gamma ray, X-ray ormicrowave electromagnetic radiation is incident thereon.

It may be that the image data further comprises image data relating to abackground of the object on which the identification element(s) to whichthe outline data relates are provided, the said identificationelement(s) being (e.g. optically) distinguishable from the backgroundwhen electromagnetic radiation is incident on the said background and onthe said identification element(s).

It may be that the object comprises a substrate comprising theidentification element(s). It may be that the image data relating to thebackground comprises image data relating to (e.g. representing) thesubstrate comprising the identification elements. It may be that thesubstrate provides the background on which the identification elementsare provided.

It may be that the image data further comprises image data relating to aor the substrate of the object comprising the identification element(s)to which the outline data relates, the said identification element(s)being (e.g. optically) distinguishable from the substrate whenelectromagnetic radiation is incident on the said substrate and on thesaid identification element(s).

It may be that the identification element(s) to which the outline datarelates are distinguishable from the background or substrate whenelectromagnetic radiation is incident on the said background orsubstrate and on the said identification element(s) by the saididentification element(s) interacting differently with or respondingdifferently to the said incident electromagnetic radiation from the saidbackground or substrate.

It may be that the identification element(s) to which the outline datarelates are detectable when electromagnetic radiation is incidentthereon by being (e.g. optically) distinguishable from the background orsubstrate when electromagnetic radiation is incident on the saidbackground or substrate and on the said identification element(s).

It may be that the image data is two-dimensional image data. It may bethat the outline data relates to two-dimensional outline(s) of one ormore of the identification element(s) to which the image data relates.It may be that the outline data represents two-dimensional outline(s) ofat least respective portion(s) of one or more of the identificationelement(s) to which the image data relates.

It may be that the said one or more processors are computerprocessor(s). It may be that the said one or more processors arehardware processor(s). It may be that the said one or more processorsare general purpose or special purpose processor(s). It may be that thesaid one or more processors comprise a plurality of processors providedby the same machine or distributed across more than one machine.

It may be that the one or more processors are configured to perform themethod. It may be that the data processing apparatus comprises a memorystoring instructions executable by the one or more processors to performthe method.

It may be that the method comprises determining the authentication datafrom the outline data by performing one or more measurements on theoutline data.

It may be that the said outline(s) to which the outline data relateshave position(s) based on the position(s) of the correspondingidentification element(s) to which the said image data relates.

It may be that the said outline(s) to which the outline data relateshave a spatial distribution based on a spatial distribution of thecorresponding identification element(s) to which the said image datarelates.

It may be that the method comprises determining the authentication databased on the position(s) of the outline(s) to which the outline datarelates.

It may be that the object comprises a plurality of identificationelements. It may be that the image data relates to a plurality of thesaid identification elements of the object. It may be that the outlinedata relates to outlines of a plurality of the said identificationelements to which the image data relates.

It may be that the said outlines to which the outline data relates haverelative positions based on the relative positions of the correspondingidentification elements to which the said image data relates. It may bethat the method comprises determining the authentication data based onthe relative positions of the outlines to which the outline datarelates.

It may be that the method comprises determining the authentication datafrom the outline data based on a or the spatial distribution of theoutline(s) to which the said outline data relates.

It may be that the method comprises determining the authentication datafrom the outline data by measuring a spatial distribution of theoutline(s) to which the outline data relates.

It may be that the outline data comprises a plurality of pixels relatingto (e.g. representing at least portion(s) of) the said outline(s) of thesaid one or more of the identification element(s) to which the imagedata relates. It may be that the method comprises determining theauthentication data based on a spatial distribution of the said pixels.It may be that the authentication data is a measure of a spatialdistribution of the said pixels.

It may be that the method comprises determining the authentication datafrom the outline data by measuring a spatial distribution of the pixelsof the outline data relating to (e.g. representing at least portion(s)of) the said outline(s) of the said one or more of the identificationelement(s) to which the image data relates.

It may be that the authentication data relates to a spatial distributionof the identification element(s) to which the outline data relates.

Typically the object comprises a plurality of distributed identificationelements.

It may be that the object comprises a plurality of randomly distributedidentification elements.

It may be that the object is an object from a group of objectscomprising a plurality of objects. It may be that each object from thesaid group of objects has a plurality of identification elements whichare detectable (e.g. which are optically visible) when electromagneticradiation is incident thereon. It may be that the identificationelement(s) of each object from the said group of objects has a uniquespatial distribution relative to the other objects of the said group ofobjects. Thus, it may be that the authentication data uniquelyidentifies the object from the other objects of the said group ofobjects. In this case, not only does the authentication data allow theobject to be authenticated, it also allows the object to bedistinguished from the other objects of the group. It will be understoodthat any of the features described herein relating to the identificationelements of the object may also apply to the identification elements ofthe other object(s) of the said group where appropriate.

It may be that the authentication data comprises a numerical oralphanumerical code.

It may be that the method comprises dividing the outline data into aplurality of sub-regions. It may be that the method comprises countingthe number of outline pixels (e.g. pixels of the outline data relatingto or representing the at least portion(s) of the outline(s) to whichthe outline data relates) in each sub-region to determine theauthentication data (typically comprising a numerical or alphanumericalcode) from the outline data.

Authentication data (typically comprising a numerical or alphanumericcode) derived from a unique spatial distribution of identificationelements of an object cannot be readily reverse engineered, thus makingthe object very difficult to counterfeit.

It may be that one or more or each of the identification element(s) towhich the outline data relates are elongate. It may be that thedetectable portions of one or more of the identification element(s), orthe portions of one or more of the identification element(s) captured inthe image data, are elongate. Although it is not necessary for theidentification element(s) to which the outline data relates to beelongate in order to obtain the benefits of improved consistency andreproducibility of the authentication data provided by determining theauthentication data from the outline data rather than directly from theimage data, the said benefits are even more pronounced when theidentification element(s) are elongate. The more elongate theidentification element(s), the more pronounced the benefits.

It may be that the object comprises a label comprising one or more ofthe identification element(s) to which the outline data relates.Preferably the label is integrally formed with the object, but it may bethat the label is attached to or printed, affixed to or etched on theobject.

It may be that the identification element(s) to which the outline datarelates are embedded identification elements. It may be that theidentification element(s) are embedded in the object, such as embeddedin the label of the said object. By embedding the identificationelement(s) in the said object, the object becomes more difficult tocounterfeit.

It may be that the identification element(s) to which the outline datarelates are printed on or affixed to or etched on the object or providedin a coating applied to the object.

It may be that the identification element(s) to which the outline datarelates are detectable by way of electromagnetic radiation whenelectromagnetic radiation is incident thereon. It may be that theidentification element(s) to which the outline data relates aredetectable by way of its/their interaction with or response toelectromagnetic radiation incident thereon. For example, it may be thatthe one or more identification element(s) to which the outline datarelates are detectable by reflecting, absorbing, transmitting orabsorbing and re-emitting incident electromagnetic radiation. It may bethat the one or more identification element(s) to which the outline datarelates are detectable by reflecting, absorbing, transmitting orabsorbing and re-emitting incident visible, ultraviolet, infrared, gammaray, X-ray or microwave electromagnetic radiation. It may be that theone or more identification elements to which the outline data relatescomprise one or more reflective, electromagnetic radiation absorbent,transparent or luminescent (e.g. fluorescent) identification elements.It may be that the identification element(s) are detectable (e.g.optically visible) by reflecting (e.g. visible) electromagneticradiation incident thereon. It may be that the identification element(s)are more or less reflective of the said incident electromagneticradiation than a or the background of the object on which theidentification element(s) are provided or than a or the substratecomprising the identification element(s). It may be that theidentification element(s) are detectable (e.g. optically visible) byabsorbing (e.g. visible) electromagnetic radiation incident thereon. Itmay be that the identification element(s) are more or less absorptive ofthe said incident electromagnetic radiation than a or the background ofthe object on which the identification element(s) are provided or than aor the substrate comprising the identification element(s). It may bethat the identification elements are detectable (e.g. optically visible)by emitting (e.g. visible) electromagnetic radiation responsive to (e.g.ultraviolet) electromagnetic radiation incident thereon, such as byabsorbing (e.g. ultraviolet) electromagnetic radiation incident thereonand re-emitting (e.g. visible) electromagnetic radiation. It may be thatthe identification element(s) absorb and re-emit electromagneticradiation to a greater or lesser extent than a or the background of theobject on which they are provided or than a or the substrate comprisingthe identification element(s). It may be that the identificationelement(s) are more or less luminescent (e.g. fluorescent) in responseto said incident electromagnetic radiation than a or the background ofthe object on which they are provided or than a or the substratecomprising the identification element(s). It may be that theidentification element(s) are detectable (e.g. optically visible) bytransmitting (e.g. visible) electromagnetic radiation incident thereon.It may be that the identification element(s) are more or lesstransparent to the said incident electromagnetic radiation than a or thebackground of the object on which the identification element(s) areprovided or than a or the substrate comprising the identificationelement(s).

It may be that the identification elements of the object are visuallyindistinguishable from a or the background of the object on which theyare provided or from a or the substrate comprising the identificationelement(s) (or visually indistinguishable from the rest of the object)when illuminated only with visible electromagnetic radiation (e.g. ofwavelength in the range 380 nm to 700 nm). In this case, theidentification elements are typically distinguishable from thebackground or substrate when electromagnetic radiation of a non-visiblewavelength is incident thereon. Alternatively, it may be that theidentification elements of the object are visible, and typicallyoptically distinguishable over the background or substrate, when visibleelectromagnetic radiation is incident thereon.

It may be that the identification element(s) to which the outline datarelates are optically detectable (e.g. by way of visible electromagneticradiation) when electromagnetic radiation is incident thereon.

It may be that the one or more identification element(s) to which theoutline data relates are optically detectable (e.g. optically visible)by reflecting, transmitting or absorbing visible incidentelectromagnetic radiation (i.e. visible to humans) or by absorbingincident electromagnetic radiation and (e.g. fluorescently) re-emittingvisible electromagnetic radiation.

It may be that the one or more identification element(s) to which theoutline data relates are optically detectable (e.g. optically visible)by reflecting, transmitting or absorbing incident electromagneticradiation having a wavelength in the range 380 nm to 700 nm or byabsorbing incident electromagnetic radiation and (e.g. fluorescently)re-emitting electromagnetic radiation having a wavelength in the range380 nm to 700 nm.

It may be that the one or more identification elements to which theoutline data relates comprise one or more particles, flakes, foils,threads or fibres. It may be that the one or more identificationelements to which the outline data relates comprise one or more metalshards.

Typically the identification elements to which the outline data relatescomprise fibres. Optionally, the fibres are selected from the groupconsisting of viscose rayon fibres, polyamide (nylon) fibres, polyesterfibres, wool fibres, cellulose fibres, synthetic fibres, glass fibres,ceramic fibres, paper fibres and water-resistant paper fibres. It may bethat the identification elements are viscose rayon fibres.

Alternatively, the identification elements may be solid particulates.For example, the identification elements may be selected from the groupconsisting of mica, silica and synthetic particulates.

Typically, the identification element(s) to which the outline datarelates are fluorescent so that they emit visible light in response toultraviolet light. Typically, the identification element(s) to which theoutline data relates are provided with a fluorescent coating (e. g. bybeing dyed with a fluorescent dye such as salicyladazine ornapthaldazine which are particularly appropriate fluorescent dyes forviscose rayon fibres) or the identification element(s) to which theoutline data relates may be naturally fluorescent (e.g. theidentification element(s) may comprise the mineral fluorite or the rangeof lanthanides, such as terbium and dysprosium). Alternatively, theidentification element(s) to which the outline data relates may bevisible (e.g. by reflection, transmission or absorption or absorptionand re-emission of electromagnetic radiation incident thereon) whenlight of visible or infrared wavelengths is incident thereon. Thus itmay be that the identification elements are optically detectable whenultraviolet, visible or infrared electromagnetic radiation is incidentthereon.

By the identification element(s) being detectable by way of (e.g.reflecting, transmitting, absorbing or emitting) visible electromagneticradiation when electromagnetic radiation is incident thereon, low costcameras capturing image data using wavelengths of electromagneticradiation in the visible range (380 nm-700 nm) may be used in order tocapture the image data.

It may be that the method includes causing electromagnetic radiation,such as visible, ultraviolet, infrared, gamma ray, X-ray or microwaveelectromagnetic radiation, to be incident on the identificationelement(s) to which the outline data relates such that they aredetectable.

It may be that the method comprises causing electromagnetic radiation tobe detected by image capture equipment (e.g. a camera) to therebycapture an image relating to one or more identification element(s) ofthe object. It may be that the image data represents or is derived fromthe image captured by the image capture equipment (e.g. camera).

It may be that the object comprises a reference marker. It may be thatthe image data and/or the outline data relates to one or moreidentification elements provided at a portion of the object identifiedwith reference to the reference marker.

It may be that the reference marker is in the form of a printed symbol.Preferably, the reference marker does not have rotational symmetry, sothat the orientation of the object can be determined from theorientation of the reference marker. Thus, it may be that the referencemarker is not rotationally symmetric. Preferably, the reference markeris in a T-shape.

It may be that the outline(s) to which the outline data relates comprisesingle pixel outline(s). It will be understood that a said single pixeloutline typically consists of a single pixel wide arrangement of aplurality of pixels outlining a respective identification element.

It may be that the method further comprises causing electromagneticradiation to be incident on the one or more identification elements towhich the outline data relates such that the one or more identificationelements are detectable.

It may be that the data processing apparatus is provided by a devicecomprising an electromagnetic radiation source for emittingelectromagnetic radiation, the identification elements being detectablewhen the electromagnetic radiation emitted by the electromagneticradiation source is incident thereon. It may be that the electromagneticradiation source is a source of visible electromagnetic radiation.Alternatively the electromagnetic radiation source may be a source ofultraviolet, gamma ray, X-ray or microwave or infrared electromagneticradiation.

It may be that the device further comprises image capture equipment forcapturing an image of the identification elements to which the imagedata relates. The image data may represent or be derived from the saidcaptured image. Alternatively, it may be that the device is configuredto receive the image data, for example, from image capture equipmentexternal to the device.

It may be that the device is handheld.

It may be that the object can be authenticated by a spatial distributionof one or more identification elements of a portion of the object. Itmay be that the image data relates to the said one or moreidentification elements of the said portion of the object. It may bethat the said portion of the object can be determined from the location(and typically the orientation) of a or the reference marker (e.g. areference symbol) of the object. It may be that the device is adapted todetect the location (and typically an orientation) of a or the referencemarker (e.g. a or the reference symbol) of the object, and to provideimage data relating to the said portion of the object in dependencethereon. Typically the said portion comprises one or more identificationelements of the object. Typically the said one or more identificationelements of the said portion of the object have a unique spatialdistribution by which the object can be authenticated.

It may be that the image data is greyscale image data. Alternatively itmay be that the data processing apparatus is configured to convertobtained image data into greyscale image data, for example prior toprocessing the image data to determine the outline data.

It may be that the object is a solid object. It may be that the objectcomprises paper, plastic, glass, metal or fabric comprising theidentification elements. It may be that the object is an item ofclothing, footwear, an electronic device, electrical appliance or adocument such as a form of identification, such as a passport or drivinglicence, or a bank note, a cheque a debit, credit or store card or anysecure documentation.

According to a third aspect of the invention, a method is provided ofgenerating or updating an authentication data store comprisingauthentication data for authenticating an object comprising one or moreidentification elements which are detectable (e.g. optically visible)when electromagnetic radiation is incident thereon. It may be that themethod of the third aspect comprises determining authentication data forauthenticating an object by the method of the second aspect of theinvention.

It may be that the method of the third aspect further comprises storingthe authentication data in the authentication data store.

By generating or updating an authentication data store comprising theauthentication data, a manufacturer of the object can keep a record ofthe authentication data applied to each object it manufactures. Thisrecord can then be used in the future to determine whether an objectpurporting to have been manufactured by the manufacturer is genuine, forexample by comparing authentication data derived from the identificationelements of the object to authentication data from the authenticationdata store.

It may be that the method of the third aspect further comprisesobtaining further image data relating to one or more identificationelements of a further object which are detectable (e.g. opticallyvisible) when electromagnetic radiation is incident thereon. It may bethat the method of the third aspect further comprises processing thefurther image data to determine further outline data relating tooutline(s) of one or more identification element(s) to which the saidfurther image data relates. It may be that the method of the thirdaspect further comprises determining further authentication data forauthenticating the further object from the further outline data. It maybe that the method of the third aspect further comprises storing thefurther authentication data in the authentication data store. In thisway, an authentication data store can be provided which storesauthentication data relating to a group of objects.

As discussed above, it may be that the identification elements of eachobject of the said group of objects from which the authentication datais derived has a unique spatial distribution relative to the otherobjects of the said group of objects. Thus, it may be that theauthentication data uniquely identifies the object from the otherobjects of the said group of objects.

Typically, the object is provided with a secondary identifier. It may bethat the method of the third aspect includes recording informationrelating to the secondary identifier, typically in association with therespective authentication data of that object. Preferably, the secondaryidentifier is unique to the object, such that it uniquely identifies theobject in a or the said group of objects.

A fourth aspect of the invention provides a method of authenticating anobject comprising one or more identification elements which aredetectable (e.g. optically visible) when electromagnetic radiation isincident thereon. It may be that the method comprises determiningauthentication data for authenticating the object by the method of thesecond aspect of the invention. It may be that the method of the fourthaspect of the invention comprises authenticating the object by way ofthe authentication data. For example, it may be that the method of thefourth aspect comprises authenticating the object by comparing theauthentication data to predetermined authentication data from anauthentication data store. It may be that the authentication data storeis stored in a local memory or in a remote memory such as a memory of aremote server. In the latter case, it may be that the predeterminedauthentication data is obtained from the memory of the remote server byway of a wired or wireless communications network. In another example,it may be that the method of the fourth aspect comprises authenticatingthe object by: transmitting (e.g. by way of a wired or wirelesscommunications network, e.g. to a remote server comprising theauthentication data store) the authentication data for comparison withpredetermined authentication data from an authentication data store; andreceiving authentication result data relating to the authentication ofthe object, the authentication result data depending on a comparisonbetween the transmitted authentication data and the predeterminedauthentication data from the authentication data store (e.g. performedby a device such as a remote server comprising the authentication datastore). In this latter case, the authentication store may be stored atone or more centralised remote servers. This may be beneficial as amanufacturer may only need to store and update a centralisedauthentication data store, thereby avoiding providing copies of the datastore which may present a security risk or versioning issues.

It may be that the method of the fourth aspect comprises providing anauthentication output indicative of whether the object has beendetermined to be genuine. Typically the authentication output is basedon the said authenticating of the object by way of the authenticationdata.

It may be that the authentication data comprises a numerical oralphanumerical code. It may be that comparing the authentication data topredetermined authentication data from an authentication data storecomprises comparing the numerical or alphanumerical code with one ormore corresponding numerical or alphanumerical codes from theauthentication data store, such as to within a specified tolerancelevel. Different tolerance levels may be selected to specify differentlevels of security.

Typically, the object is provided with a or the secondary identifier,such as a serial number.

It may be that the method of the fourth aspect of the inventioncomprises identifying the secondary identifier of the object from theimage data. It may be that the method of the fourth aspect of theinvention comprises selectively comparing the authentication data toauthentication data from the authentication data store associated withthe said secondary identifier. This helps to perform authentication ofthe object more quickly and less computationally intensively.

A fifth aspect of the invention provides data processing apparatuscomprising one or more processors, the data processing apparatus beingconfigured to perform the method of the third aspect of the invention.

A sixth aspect of the invention provides data processing apparatuscomprising one or more processors, the data processing apparatus beingconfigured to perform the method of the fourth aspect of the invention.

As above, it may be that the said one or more processors are computerprocessor(s). It may be that the said one or more processors arehardware processor(s). It may be that the said one or more processorsare general purpose or special purpose processor(s). It may be that thesaid one or more processors comprise a plurality of processors providedby the same machine or distributed across more than one machine.

It may be that the one or more processors are configured to perform therespective method. It may be that the respective data processingapparatus comprises a memory storing instructions executable by one ormore processors to perform the respective method.

A seventh aspect of the invention provides a (typically non-transitory)computer readable medium comprising computer readable code which whenexecuted on data processing apparatus causes the data processingapparatus to perform the method according to the third aspect of theinvention.

An eighth aspect of the invention provides a (typically non-transitory)computer readable medium comprising computer readable code which whenexecuted on data processing apparatus causes the data processingapparatus to perform the method according to the fourth aspect of theinvention.

A ninth aspect of the invention provides a computer program productcomprising instructions which, when the program is executed by acomputer, cause the computer to perform the method according to thesecond aspect of the invention.

A tenth aspect of the invention provides a computer program productcomprising instructions which, when the program is executed by acomputer, cause the computer to perform the method according to thethird aspect of the invention.

An eleventh aspect of the invention provides a computer program productcomprising instructions which, when the program is executed by acomputer, cause the computer to perform the method according to thefourth aspect of the invention.

A twelfth aspect of the invention provides a computer implemented methodcomprising the method of the second aspect of the invention implementedby a computer.

A thirteenth aspect of the invention provides a computer implementedmethod comprising the method of the third aspect of the inventionimplemented by a computer.

A fourteenth aspect of the invention provides a computer implementedmethod comprising the method of the fourth aspect of the inventionimplemented by a computer.

A fifteenth aspect of the invention provides a device, such as ahandheld device, comprising the data processing apparatus according toany of the first, fifth or sixth aspects of the invention. It may bethat the device comprises an or the electromagnetic radiation source foremitting electromagnetic radiation, the identification elements of thedevice being detectable (e.g. optically visible) when electromagneticradiation emitted by the electromagnetic radiation source is incidentthereon. It may be that the device comprises image capture equipment,such as a camera, for capturing the said image data relating to theidentification elements when electromagnetic radiation is incidentthereon.

The various aspects, embodiments, examples and alternatives set out inthe preceding paragraphs, in the claims and/or in the followingdescription and drawings may be provided independently or in anycombination. Features described in connection with one embodiment areapplicable to all embodiments unless such features are incompatible.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the invention are further described hereinafter withreference to the accompanying drawings, in which:

FIG. 1 schematically illustrates an object having a label comprising aplurality of identification elements;

FIG. 2 is a close-up illustration of the label of the object of FIG. 1;

FIG. 3 schematically illustrates a system for determining authorisationdata from the label of the object of FIG. 1;

FIG. 4A illustrates the determination of a numerical code from imagedata relating to an image of a portion of the label of the object ofFIG. 1;

FIG. 4B illustrates the determination of a numerical code from outlinedata determined from an image of a portion of the label of the object ofFIG. 1;

FIGS. 5A-5B respectively illustrate an example image of an elongateidentification element and its outline;

FIG. 6A schematically illustrates an example image of the identificationelement of FIG. 5A but taken from a closer distance compared to theimage of FIG. 5A, while FIG. 6B illustrates the outline of theidentification element from the image of FIG. 6A;

FIG. 7A shows an image of an identification element of the label of theobject of FIG. 1, and

FIG. 7B schematically illustrates an outline of the identificationelement of the image of FIG. 7A;

FIGS. 8A-8C illustrate a method for determining the outline of anidentification element based on thresholding;

FIG. 9 illustrates a method of generating or updating an authenticationdata store storing authentication data for authenticating objects of thetype shown in FIG. 1;

FIG. 10 illustrates a table relating to objects of the type shown inFIG. 1, the table associating serial numbers of the objects withnumerical codes derived from the spatial distributions of identificationelements on their labels or portions thereof;

FIG. 11 illustrates a method of authenticating an object of the typeshown in FIG. 1;

FIGS. 12A-12B respectively illustrate an example image of a squareidentification element and its outline; and

FIG. 13A schematically illustrates an example image of the squareidentification element of FIG. 12A but taken from a closer distancecompared to the image of FIG. 12A, while FIG. 13B illustrates theoutline of the identification element from the image of FIG. 13A.

DETAILED DESCRIPTION

The present disclosure relates to data processing apparatus, a method, acomputer implemented method, computer software and one or more computerreadable media storing computer software for determining authenticationdata for authenticating an object. It may be that the authenticationdata is derived from image data relating to one or more identificationelements of the object. It may be that the image data is obtained bycausing electromagnetic radiation to be incident on the identificationelements and (e.g. optically) detecting the identification elements. Itmay be that the image data is threshold processed to determine outlinedata relating to outline(s) of one or more of the said one or moreidentification elements of the image. It may be that the authenticationdata is determined from the outline data, preferably to provideauthentication data which is more tolerant to differences in theconditions under which the image data is captured.

FIG. 1 schematically shows an object 1, such as a product (such as anitem of clothing such as a T-shirt, a shirt, a shoe or similar) or adocument (such as a passport, a bank note, a credit or debit card, acertificate or similar) having a label 2. As shown in FIG. 2, which is aclose-up view of the label 2 of FIG. 1, the label 2 comprises asubstrate having a plurality of identification elements 4. Also shown inFIG. 2 is a reference symbol 6 printed on the label 2, which in thisexample is a T and thus lacks rotational symmetry. The reference symbolneed not be a T but it is advantageous for the reference symbol to lackrotational symmetry at least because, if the reference symbol does nothave rotational symmetry, the orientation of the reference symbol can beused to determine an orientation of the label 2 and thus the object 1.

The identification elements 4 may be provided on the label 2 as shown inFIG. 2 or elsewhere on the object 1. The object 1 may comprise, forexample, paper, plastic, glass, metal or fabric comprising theidentification elements 4. The identification elements 4 may be embeddedin the object 1 (such as embedded in the label 2 of the object 1) or theidentification elements 4 may be printed or otherwise affixed to oretched on the surface of the object 1 (such as printed or otherwiseaffixed to or etched on the surface of the label 2 of the object 1). Theidentification elements 4 may be embedded in a coating applied to theobject 1 (e.g. during manufacture), such as embedded in a coatingapplied to the label 2 of the object 1. It may be that the coating is anadhesive coating.

It may be that the identification elements 4 comprise one or more metalshards, flakes, foils, threads or fibres. For example, theidentification elements 4 may be selected from the group consisting ofviscose rayon fibres, polyamide (nylon) fibres, polyester fibres, woolfibres, cellulose fibres, synthetic fibres, glass fibres, ceramicfibres, paper fibres and water-resistant paper fibres. It may be thatthe identification elements are viscose rayon fibres. Alternatively, theidentification elements may be solid particulates. For example, theidentification elements may be selected from the group consisting ofmica, silica and synthetic particulates.

Ceramic fibres may be particularly useful in some applications as theyare able to withstand high temperatures. For example, it may be that theidentification element(s) 4 are embedded in a glass object. In thiscase, it may be that the process for embedding the identificationelement(s) 4 in the glass object comprises incorporating theidentification element(s) 4 into molten glass before cooling the moltenglass to form a solidified glass object comprising the embeddedidentification element(s). In this case, the identification element(s) 4may comprise or consist of ceramic fibres. Ceramic fibres areparticularly suited to this application as they are able to withstandthe high temperatures of the molten glass. It will be understood that,alternatively, a glass object may be provided with identificationelement(s) 4 incorporated within a coating applied to the glass object,for example to solidified glass rather than to molten glass. In thiscase, the identification element(s) 4 do not need to withstand hightemperatures and could comprise any suitable identification element(s) 4such as cellulose fibre(s).

The identification elements 4 may be detectable (e.g. optically visible)when electromagnetic radiation is incident on them (e.g. by reflection,transmission, absorption or absorption and re-emission). For example, itmay be that the identification elements 4 reflect visibleelectromagnetic radiation (e.g. electromagnetic radiation having awavelength in the wavelength range 380 nm-700 nm) incident upon them sothat they are optically detectable by way of the reflected visibleelectromagnetic radiation. It may be that the identification elements 4are more reflective of visible electromagnetic radiation incident uponthem than the substrate of the label 2 comprising the identificationelements 4 so that they are optically distinguishable from the saidsubstrate when visible electromagnetic radiation is incident thereon.That is, in this case, the substrate provides a background which is lessreflective of visible electromagnetic radiation than the identificationelements 4. In another example, it may be that the identificationelements 4 absorb visible electromagnetic radiation (e.g.electromagnetic radiation having a wavelength in the wavelength range380 nm-700 nm) incident upon them so that they are optically detectableby way of the absorbed visible electromagnetic radiation. It may be thatthe identification elements 4 are more absorptive of the incidentvisible electromagnetic radiation than the substrate of the label 2comprising the identification elements 4 so that they are opticallydistinguishable from the substrate. That is, in this case, the substrateprovides a background which is less absorptive of visibleelectromagnetic radiation than the identification elements 4. In otherexamples, it may be that the identification elements 4 are fluorescent(or otherwise luminescent) such that they emit visible electromagneticradiation when electromagnetic radiation is incident upon them, such asultraviolet or infrared electromagnetic radiation having wavelengths ofless than 380 nm or greater than 700 nm respectively, so that they areoptically detectable by way of the emitted visible electromagneticradiation. For example, it may be that the identification elements 4 aremore fluorescent than the substrate of the label 2 comprising theidentification elements 4 so that they are optically distinguishablefrom the substrate. That is, in this case, the substrate provides abackground which is less fluorescent of visible electromagneticradiation in response to the incident electromagnetic radiation than theidentification elements 4.

In the event that the identification elements are fluorescent, it may bethat the identification elements 4 are provided with a fluorescentcoating (e.g. the identification elements may be fluorescent by beingdyed with a fluorescent dye such as salicyladazine or napthaldazinewhich are particularly appropriate fluorescent dyes for viscose rayonfibres) or they may be made from a material that is naturallyfluorescent, such as the mineral fluorite or the range of lanthanides,such as terbium and dysprosium.

The identification elements 4 are preferably (but are not necessarily)elongate. It may be that the portions of one or more or each of theidentification elements 4 which are detectable are elongate. Forexample, in the example of FIG. 2, the identification elements areelongate viscose rayon fibres. The identification elements may be 3 to 8millimetres long or 4 to 8 millimetres long (e.g. 3 mm or 6 mm long).The identification elements may be less than 1.5 millimetres in diameteror less than 1 millimetre in diameter, for example 20 to 40 microns indiameter (e.g. 30 microns in diameter).

However, the identification elements may be of any suitable alternativedimensions. Although the example dimensions are expressed as length anddiameter, whilst the identification elements 4 may be cylindrical, itwill be understood that the identification element(s) do not need to becylindrical, and that they may be any suitable shape. In the case wherean identification element 4 is cylindrical, the diameter dimension maybe understood as the length of a straight line passing through thecentre, and between opposing sides, of a cross section of theidentification element 4 taken perpendicular to its length. In the casewhere an identification element 4 is not cylindrical, the diameterdimension may be understood as the greatest extent between opposingsides of a cross section of the identification element 4 takenperpendicular to its length.

It may be that, for one or more or each of the identification element(s)4, the ratio of the length of the identification element 4 to thediameter (or greatest extent between opposing sides) of a cross sectionof the identification element 4 taken perpendicular to its length isgreater than 1, greater than 2, greater than 3, greater than 5 orgreater than 10.

As shown in FIG. 2, the identification elements 4 may be spatiallydistributed across the label 2. Preferably the object 1 is an objectfrom a group of similar objects each comprising a plurality ofidentification elements 4. In this case, it may be that theidentification elements of each object in the group of objects arepositioned differently and are thus uniquely spatially distributedacross at least a portion of the object 1, for example uniquelyspatially distributed across the label 2 of the object 1, so that eachobject 1 of the group of objects has a different spatial distribution ofidentification elements 4. For example, it may be that the spatialdistribution of identification elements across the said at least aportion of the object is random for each object of the group. Thus, eachobject of the group can be identified by the spatial distribution of itsidentification elements.

The identification elements 4 may be, for example, spatially distributedacross a surface of the object 1 or across a portion of a surface of theobject 1, such as across the label 2 of the object 1 or a portionthereof. It may be that each object 1 of the group of objects can beidentified from the positions, or spatial distribution, of all of theidentification elements 4 of the object. It may be that each object 1can be identified from the positions, or spatial distribution, of asubset of the identification elements 4 of the object 1. For example, itmay be that a portion of the object 1, such as a portion 8 of the label2 of the object 1 enclosed by the dashed box 9 of FIG. 2, is defined byreference to the reference symbol 6 (and typically with reference to theorientation of the reference symbol 6). In this case, it may be that theobject 1 can be identified by the positions, or spatial distribution, ofthe identification elements 4 provided in the portion 8 of the object 1defined by reference to the reference symbol 6 (and typically withreference to the orientation of the reference symbol 6). In the portion8 of the object 1 shown in FIG. 2, there are three identificationelements 4, and the object 1 can be identified by the positions, orspatial distribution, of the three identification elements 4.

A system 20 for authenticating the object 1 (i.e. for verifying that theobject 1 is genuine) is illustrated in FIG. 3. The system 20 maycomprise a device 22, which may be handheld. The device 22 may have anelectromagnetic radiation source 24 for emitting electromagneticradiation. The device 22 may have image capture equipment 25 such as acamera for capturing an image of the label 2 of the object 1 whenelectromagnetic radiation from the electromagnetic radiation source 24is incident thereon. The device 22 may have one or more processors 26such as one or more computer hardware microprocessors. The device 22 mayhave a memory 28 for storing image data relating to (e.g. image datarepresenting) images captured by the image capture equipment 25 and forstoring instructions executable by the one or more processors 26 toprocess the image data. It may be that any two or more (or all) of theelectromagnetic radiation source 24, image capture equipment 25,processor(s) 26, memory 28 are provided in a common housing of thedevice 22. It may be that the device 22 is in communication with anauthentication data store 30, such as wired or wireless communication,for example, by way of a wired or wireless communication network.Alternatively it may be that the authentication data store 30 is storedin local memory 28 or in another memory (not shown) of the device 22.Particularly in examples where the identification elements 4 areoptically detectable by reflecting, transmitting or absorbing visibleelectromagnetic radiation, it may be that electromagnetic radiationsource 24 is not required and that ambient light can instead be incidenton the identification elements such that they are optically detectable.

In order to use the positions, or spatial distribution, ofidentification elements 4 of an object 1 to authenticate it, oneapproach is for a manufacturer to: obtain image data relating to animage of at least a portion of the object 1 comprising identificationelements 4 (such as a portion of the object 1 comprising identificationelements defined by reference to the position of the reference symbol 6and its orientation); derive authentication data, such as a numerical oralphanumerical code, from a spatial distribution of pixels of theidentification elements 4 of the object 1 provided in the said imagedata; and store the authentication data in authentication data store 30(which may be a centralised authentication data store held by themanufacturer). For example, as illustrated in FIG. 4A, image data 35relating to an image of a portion 8 of label 2 (see FIG. 2) defined withreference to the position of the reference symbol 6 (and typically withrespect to its orientation) may be obtained and split into sub-regions.The image data may comprise a plurality of pixels representing theidentification elements 4. As illustrated in FIG. 4A, the portion(s) ofone or more or each of the identification elements 4 captured in theimage data may be elongate. It may be that the portion(s) of one or moreor each of the identification elements 4 captured in the image data havea ratio of length to width of greater than 1, greater than 2, greaterthan 3, greater than 5 or greater than 10. The number of identificationelement pixels in each of the sub-regions may be counted. In this case,it is assumed that the pixels of the image data 35 corresponding to theidentification elements 4 are darker than the pixels of the image data35 corresponding to the background of the label 2 on which theidentification elements 4 are provided (e.g. the image data 35 mayrelate to a negative image). However, it will be understood that thepixels of the image data 35 corresponding to the identification elements4 may be brighter than the pixels corresponding to the background of thelabel 2 on which the identification elements 4 are provided (e.g. theimage data 35 may relate to a positive image).

In order to determine whether a pixel of the image data 35 is anidentification element pixel or not, binary thresholding may be applied.For example, pixels having pixel values of less than a threshold may beconsidered to be identification element pixels, while pixels havingpixel values of greater than the threshold may be considered to not beidentification element pixels, or vice versa if the pixels of the imagedata 35 corresponding to the identification elements 4 are brighter thanthe pixels of the image data 35 corresponding to the background of thelabel 2 on which they are provided. Authentication data 37 may compriseor consist of the collection of identification element pixel counts forthe sub-regions. In the example of FIG. 4A, the authentication data 37may be: (220, 180, 0; 0, 500, 160; 0, 20, 120). The first set of threenumbers of the authentication data relate to the respective numbers ofidentification element pixels in each of three sub-regions in a first,top, left-to-right row of sub-regions; the second set of three numbersrelate to the respective numbers of identification element pixels ineach of three sub-regions in a second left-to-right row of sub-regionsimmediately below the first row; and the third set of three numbersrelate to the respective numbers of identification element pixels ineach of three sub-regions in a third left-to-right row of sub-regionsimmediately below the second row. The authentication data 37 is storedin the authentication data store 30.

In order to later authenticate the object 1 (i.e. verify that it isgenuine), it may be that authentication data is derived from the spatialdistribution of the pixels of identification elements 4 from anotherimage of the portion 8 of the object 1 defined by reference to thereference symbol 6 (typically also with reference to its orientation) inthe same way for comparison with the authentication data stored in theauthentication data store 30. If there is a match between theauthentication data originally determined by the manufacturer and theauthentication data determined later to verify that the object isgenuine, it may be determined that the object 1 is genuine. If not, itmay be determined that the object 1 is not genuine. It may be that anexact match between the codes is not necessary in order to verify thatan object is genuine, but rather a match to within a predefinedtolerance range may be sufficient. Different tolerance ranges may bedefined to thereby define different security levels.

A problem with this approach is that the conditions under which theimages from which the authentication data is derived are captured maynot be consistent. For example, different cameras may be used, thedistances and/or angles between the camera and the object 1 may bedifferent, the lighting may be different, different electromagneticradiation sources may be employed and so on. Such differences can causethe same identification elements 4 to appear thicker/thinner orlonger/shorter in some images than in others, thus affecting theidentification element pixel counts and reducing the accuracy with whichthe authentication data derived from the respective images can becompared. This increases the number of false positives and falsenegatives and/or limits the security level of the system (e.g. bylimiting the tolerance range that can be applied). Accordingly,stringent controls may be imposed on the conditions under which theimages are captured, which significantly increases the cost ofimplementing a system of this type.

To illustrate, FIG. 5A shows an image 31 of a rectangular identificationelement 34 and FIG. 6A shows another image 33 of the same rectangularidentification element 34 taken from a slightly closer distance. As aresult of the difference in distance between the camera and theidentification element 34 in each case, the identification element 34appears thicker and longer in image 33 than in image 31. Theidentification element 34 in image 33 comprises 2424 pixels, whereas thesame identification element 34 in image 31 comprises 2000 pixels. Thisis a difference of 21.2% with respect to the number of pixels in image31.

By first processing the image data from which the authentication data isderived to determine outline data relating to (e.g. data representing)outlines of the identification elements as illustrated in FIGS. 7A and7B, and then deriving the authentication data from the outline datarather than directly from the image data, the differences inauthentication data caused by capturing images of the identificationelements under different conditions can be significantly reduced. Thisis because, by excluding internal pixels (i.e. within the outlines) ofthe identification elements which are present in the image data in thedetermination of the authentication data, the effect of theidentification elements appearing thicker, thinner or longer or shorterin a subsequent image on the authentication data derived therefrom isreduced.

Extending the example of FIGS. 5A and 6A, FIG. 5B illustrates outlinedata relating to a single pixel outline of the identification element 34from image 31 of FIG. 5A while FIG. 6B illustrates outline data relatingto a single pixel outline of the identification element 34 derived fromimage 33 of FIG. 6A. The outline of identification element 34 in FIG. 6Bis larger than the outline of the identification element 34 in FIG. 5Bbecause the image of FIG. 6A was captured with the identificationelement 34 a shorter distance from the camera. The outline of FIG. 5Bcomprises 416 pixels, while the outline of FIG. 6B comprises 424 pixels.This is a difference of 1.9% with respect to the number of pixels in theoutline of FIG. 5B. There is thus a significantly smaller relativedifference between the numbers of pixels of the outlines of theidentification element 34 of FIGS. 5B, 6B than between the numbers ofpixels of the identification element 34 in the respective images 31, 33of FIGS. 5A, 6A. Differences in the conditions under which images arecaptured can thus be better tolerated by determining the authenticationdata from the outline data rather than directly from the image data.This allows the numbers of false positives and false negatives to bereduced when authenticating objects. In addition, the security level ofthe system can be increased by specifying tighter tolerance ranges.Additionally or alternatively, inexpensive image capture equipment canbe used to capture images from which the authentication data is derived,and less stringent controls need to be applied to the conditions underwhich the images are captured. In this way, the authentication systemcan be implemented more inexpensively without reducing (and evenimproving) its performance.

FIG. 4B illustrates outline data 40 derived from the image data of FIG.4A. The relative positions of the outlines 41 in the outline data 40correspond to the relative positions of the identification elements 4 inthe image data 35 from which they are derived. The outlines 41 of thesaid identification elements 4 thus have relative positions, and aspatial distribution, based on the relative positions, and a spatialdistribution, of the identification elements 4 of the image data 35. Asillustrated by FIG. 4B, if portions of one or more of the identificationelements 4 captured in the image data are elongate, the correspondingoutline(s) 41 thereof are also elongate. Authentication data 44 may bederived from the outline data 40 and may relate to, and indeed may be ameasure of, the positions, or spatial distribution of, the outlines 41of the said outline data 40. The outlines 41 of the said identificationelements 4 each comprise a plurality of pixels. The authentication datamay be derived from the outline data 40 and may relate to, and indeedmay be a measure of, the positions, or spatial distribution of, thepixels of the said outline data 40. Thus, the authentication dataderived from the outline data 40 may be based on the positions, orspatial distribution, of the outlines 41 of the outline data 40. As therelative positions, and spatial distribution, of the outlines 41 of theoutline data 40 are based on the relative positions, and spatialdistribution, of the identification elements 4 from the image data 35,the authentication data derived from the outline data 40 may thus alsorelate to the relative positions, and spatial distribution, of the saidone or more identification elements 4 in the image data 35.

In the example illustrated in FIG. 4B, authentication data 44 may bederived from the outline data 40 in a similar way to way in whichauthentication data is derived directly from the image data 35 asdiscussed above with reference to FIG. 4A. More specifically, theoutline data 40 may be divided into sub-regions 42 and the numbers ofoutline pixels in each sub-region of the outline data 40 are counted. Asbefore, in order to determine whether a pixel is an outline pixel ornot, binary thresholding may be applied. For example, as above, pixelsof the outline data 40 having pixel values of less than a threshold maybe considered to be outline pixels, while pixels of the outline data 40having pixel values of greater than the threshold may be considered tonot be outline pixels, or vice versa if the pixels of the outline data40 corresponding to the outlines of the identification elements 4 arebrighter than the background pixels between them. Authentication data 44derived from the outline data 40 may comprise or consist of thecollection of outline pixel counts for the sub-regions 42. In theexample of FIG. 4B, the authentication data 44 may be (55, 45, 0; 0,125, 40; 0, 5, 30). The first set of three numbers of the authenticationdata 44 relate to the respective numbers of outline pixels in each ofthree sub-regions in a first, top, left-to-right row of sub-regions; thesecond set of three numbers relate to the respective numbers of outlinepixels in each of three sub-regions in a second left-to-right row ofsub-regions immediately below the first row; and the third set of threenumbers relate to the respective numbers of outline pixels in each ofthree sub-regions in a third left-to-right row of sub-regionsimmediately below the second row. The authentication data 44 may then bestored in the authentication data store 30 as before in order togenerate or update the authentication data store 30, or compared tocorresponding authentication data stored in the authentication datastore 30 in order to authenticate an object 1 as before.

FIG. 8A illustrates a method 50 of determining outline data 40 relatingto single pixel outlines of identification elements 4 from image data35. The method may be based on a thresholding algorithm. Again, it isassumed here that the pixels of the image data 35 corresponding to theidentification elements 4 are darker than the pixels of the image data35 corresponding to the background of the label 2 on which they areprovided, but the opposite may apply. The method 50 may comprise at 52obtaining the image data and converting it to grey scale image data. Themethod may further comprise at 54 setting a threshold value. Both 52 and54 are illustrated in dotted lines in FIG. 8A as they may be omitted.For example, the image data 35 may be captured in grey scale (and thusnot need converting to grey scale) or the method 50 may be readilyadapted for colour image processing, typically depending on the coloursof the identification elements in the image data 35. In addition, thethreshold value may be pre-set. In this case, a threshold of 100 may beapplied, assuming the image data is grey scale byte image data in whicheach pixel value is stored as an 8-bit integer (where a value of 0 isblack and 255 is white).

The method may further comprise at 56 checking the value of a pixel ofthe image data, such as the top left hand pixel of the image data. Atdecision point 58, if the pixel value is greater (or, for examples inwhich the pixels corresponding to the identification elements 4 arebrighter than the pixels corresponding to the background of the objecton which they are provided, less) than the threshold, the methodprogresses back to 56 and checks the value of the next pixel of theimage data. For example the method may choose the next pixel based on apredetermined left to right and vertically top to bottom scan of theimage data. If the pixel value is less than (or, for examples in whichthe pixels corresponding to the identification elements 4 are brighterthan the pixels corresponding to the background of the object on whichthey are provided, greater than) or equal to the threshold, a check isperformed on the values of the neighbouring pixels at 60. Theneighbouring pixels may include pixels immediately adjacent to thecurrent pixel above, below and to the left and to the right of thecurrent pixel, where available depending on the location of the pixel inthe image data. The neighbouring pixels may also include pixelsimmediately diagonally adjacent to the current pixel (i.e. top right,top left, bottom right, bottom left). At decision point 62, if at leastone neighbouring pixel has a value greater (or, for examples in whichthe pixels corresponding to the identification elements 4 are brighterthan the pixels corresponding to the background of the object on whichthey are provided, less) than the threshold, the method progresses toadd the current pixel to the outline data at 64 and the methodprogresses to the next pixel and reverts to 56. If no neighbouringpixels have a value greater (or, for examples in which the pixelscorresponding to the identification elements 4 are brighter than thepixels corresponding to the background of the object on which they areprovided, less) than the threshold, the current pixel is not added tothe outline data and the method progresses to the next pixel and revertsto 56. This can be repeated until all of the pixels of the image dataare processed, resulting in traces being performed around the outeredges of the identification elements to provide the outline data. Itwill be understood that in some cases the image data may comprise one ormore portions of one or more of the identification elements (rather thanfor example the full lengths of each of the identification elements). Inthis case, it may be that the outlines are of the respective portions ofthe identification elements.

As shown in FIGS. 8B-8C, 8-bit grey scale image data contains pixelshaving values between 0 and 255 and the threshold applied affects thesize of the outline that will be derived from image data relating to animage of an identification element. For example, the image data of FIG.8B comprises a portion of an image (the full image of which is shown inthe left hand frame of FIG. 8C) having pixels 70 having values of 100,pixels 72 having values of 160 and pixels 74 having a value of 200. Inthis example, if the threshold is set to 100, the outline shown in thecentre frame of FIG. 8C is obtained by the above method. On the otherhand, if the threshold is set to 160, the outline shown in the righthand frame of FIG. 8C is provided. The appropriate threshold value maybe selected depending on the specific implementation, e.g. depending onany one or more of: a type of substrate on which the identificationelements 4 are provided; the image capture equipment used to capture theimage data from which the authentication data is derived; the lightingconditions under which the image data from which the authentication datais derived is captured; the type of identification elements 4 provided.

FIG. 9 is a flow-chart of a method 88 for generating or updating anauthentication data store 30, which may for example be applied by amanufacturer to each object 1 of a group of objects. Each object 1 mayhave at least a portion comprising one or more identification elements 4having a unique spatial distribution with respect to the other objectsof the group. The method 88 may for example be performed by one or moreprocessors 26 of device 22, for example by executing computer programinstructions stored in memory 28. At 90, the method may compriseobtaining image data 35 relating to an image of at least a portion of anobject 1 (e.g. a label 2 or a portion of a label 2) comprisingidentification elements 4 (preferably image data relating to at least aportion of the object comprising a unique spatial distribution ofidentification elements with respect to the other objects of the group),such as by causing electromagnetic radiation from electromagneticradiation source 24 of device 22 to be incident on at least a portion ofthe object 1 comprising identification elements 4 and causing an imageof at least a portion of the object 1 comprising identification elements4 (such as portion 8 defined with reference to reference symbol 6) to becaptured by camera 25 of device 22. Typically the image data furthercomprises image data relating to a background of the object 1 on whichthe identification elements 4 are provided, the identification elements4 being optically distinguishable from the background whenelectromagnetic radiation is incident on the said background and on thesaid identification elements 4. Alternatively, an image of at least aportion of the object comprising identification elements 4 (andtypically a background of the object 1 on which the identificationelements 4 are provided, and from which the identification elements 4can be optically distinguished when electromagnetic radiation isincident on the said background and on the said identification elements4) may be captured, and image data 35 relating to that image may beprovided as an input to the method, by other means. At 92, the methodmay comprise processing the image data 35 to determine outline data 40relating to outlines 41 of the identification elements 4 of the image(e.g. by the method of FIG. 8A). The outline data 40 may be stored, atleast temporarily, in memory 28 of the device 22. Typically the outlinedata 40 comprises outlines of all of the identification elements presentin the image data 35, but this is not necessarily the case. For example,the outline data may comprise outlines of a sub-set of theidentification elements of the image data 35, such as a sub-set ofidentification elements provided at a portion of the object 1 defined byreference to the position of the reference symbol 6 (and typically itsorientation).

At 94, the method may comprise determining authentication data 44 fromthe outline data 40, such as for example as described above withreference to FIG. 4B. At 96, the method may comprise storing theauthentication data 44 in the authentication data store 30. The methodmay comprise storing the authentication data 44 in the authenticationdata store 30 in association with a secondary identifier of the object1, such as a serial number 98. This is illustrated in FIG. 10 whichprovides a table comprising serial numbers 98 and associatedauthentication data. The serial number 98 may be printed on the object 1such that, when the object 1 is later verified, the serial number 98 maybe used to determine from the authentication store 30 the specificauthentication data with which the authentication data 44 derived fromthe image data 35 should match. This allows a much quicker, lesscomputationally intensive process to be performed in order toauthenticate the object 1 since the authentication data 44 would onlyneed to be compared to authentication data from the authentication datastore relating to the serial number 98 (rather than, for example, withall of the authentication data in the authentication data store 30 inturn).

The method of FIG. 9 may be repeated for each object 1 of the group ofobjects.

FIG. 11 is a flow-chart illustrating a method 100 of authenticating anobject 1 comprising identification elements 4. The method 100 may beperformed by one or more processors 26 of the device 22, for example byexecuting computer program instructions stored in memory 28. 102-106 areidentical to 90-94 described above and so their descriptions are notrepeated here for brevity. After the authentication data 44 has beendetermined in 106, the object 1 may be authenticated using theauthentication data in 108. Authenticating the object 1 may comprisecomparing the authentication data 44 to authentication data fromauthentication data store 30. If the authentication data store 30 islocally stored on the device 22, it may be that this comparison isperformed locally on the device 22. If the authentication data store 30is remotely stored, for example on a remote server located remotely withrespect to the device 22, it may be that the authentication data 44 istransmitted to the remote server and the comparison is performed on theremote server before the results of the comparison sent back to thedevice 22 by the remote server. Alternatively, the remote server mayprovide authentication data from the authentication data store 30 to thedevice 22 which may then perform the comparison locally. It may be thatthe comparison at 108 involves systematically comparing theauthentication data derived from the outline data at 106 withauthentication data from the authentication data store 30 until a matchto within the required tolerance is found or until all of theauthentication data in the authentication data store 30 has been tested.Alternatively, it may be that the method 100 further comprises obtaininga secondary identifier (e.g. a serial number 98) from the object 1 (e.g.by performing optical character recognition on an image of the serialnumber obtained from the object 1) and comparing the authentication data44 with authentication data from the authentication data store 30associated with that secondary identifier. As explained above, by usingthe secondary identifier in this way, the comparison at 108 is quickerand less computationally intensive.

It will be understood that, if there is a match to within a requiredtolerance range at 108 between the authentication data 44 determinedfrom the outline data obtained at 106 and authentication data from theauthentication data store 30, it may be determined that the object isgenuine. If no such match is obtained, it may be determined that theobject is not genuine. The method may further comprise providing anoutput (e.g. a visual or audio or audio-visual output) indicative ofwhether the object has been determined to be genuine or not—that is, themethod may provide an output as to whether the object has beensuccessfully authenticated.

While the benefits of using the outlines 41 of the identificationelements 4 to determine the authentication data 44 apply toidentification elements 4 of any shape, the benefits are more pronouncedfor elongate identification elements. The more elongate theidentification elements, the more pronounced the benefits.

To illustrate that there are benefits to determining authentication datafrom outlines of non-elongate identification elements, FIG. 12A shows animage 120A of a square identification element 120.

FIG. 13A shows a second image 120B of the same square identificationelement 120 obtained by a camera at a reduced distance from theidentification element 120. Due to the reduced distance from the camera,the identification element 120 looks taller and wider in image 120B. Thenumber of pixels of the identification element 120 in image 120A is2024, while the number of pixels of the identification element 120 inimage 120B is 2208. This is a difference of 9.1% with respect to thenumber of pixels in image 120A.

FIG. 12B illustrates outline data relating to a single pixel outline ofthe identification element 120 derived from image 120A. This singlepixel outline comprises 176 pixels. FIG. 13B illustrates outline datarelating to a single pixel outline of the identification element 120derived from image 120B. This single pixel outline comprises 184 pixels.This is a difference of 4.5% with respect to the number of pixels in theoutline of FIG. 12B. Thus, it can be seen that differences in theconditions under which images are captured can thus be better toleratedby determining the authentication data from the outline data rather thandirectly from the image data even when the identification elements arenot elongate.

It will be understood that, although the above embodiments relate toobjects or portions of objects comprising a plurality of identificationelements, the method of determining authentication data from outlinedata can also be applied to objects having a single identificationelement (e.g. a single identification element arranged differently fordifferent objects so as to provide different authentication data foreach object of a group of objects).

Although in the above embodiments the image data from which the outlinedata (and thus the authentication data) is derived relates to an imageof a portion of the object 1 comprising a subset of the identificationelements 4 of the object 1 (which has the benefit of reducingcomputational complexity), it will be understood that alternatively theimage data from which the outline data (and thus the authenticationdata) is derived may relate to one or more images of the objectcomprising substantially all of the identification elements 4 of theobject.

Although in the above embodiments the identification elements 4 areoptically detectable by reflecting or absorbing visible electromagneticradiation incident thereon or by absorbing incident ultraviolet orinfrared electromagnetic radiation and re-emitting visibleelectromagnetic radiation, it will be understood that in otherembodiments it may be that the identification elements 4 may bedetectable by reflecting, transmitting or absorbing electromagneticradiation of any detectable wavelength (e.g. ultraviolet, infrared,gamma ray, X-ray or microwave electromagnetic radiation) or by absorbingincident electromagnetic radiation of any suitable wavelength andre-emitting electromagnetic radiation of any detectable wavelength (e.g.ultraviolet, infrared, gamma ray, X-ray or microwave electromagneticradiation). Accordingly, it will be understood that the electromagneticradiation source 24 may be a source of electromagnetic radiation of anysuitable wavelength (e.g. ultraviolet, visible, infrared, gamma ray,X-ray or microwave electromagnetic radiation) and that the image captureequipment 25 may be configured to detect electromagnetic radiation ofany suitable wavelength (e.g. ultraviolet, visible, infrared, gamma ray,X-ray or microwave electromagnetic radiation) to thereby image theidentification elements.

It will be appreciated that embodiments of the present invention can berealised in the form of hardware, software or a combination of hardwareand software. Any such software may be stored in the form of volatile ornon-volatile storage such as, for example, a storage device like a ROM,whether erasable or rewritable or not, or in the form of memory such as,for example, RAM, memory chips, device or integrated circuits or on anoptically or magnetically readable medium such as, for example, a CD,DVD, magnetic disk or magnetic tape. It will be appreciated that thestorage devices and storage media are embodiments of machine-readablestorage that are suitable for storing a program or programs that, whenexecuted, implement embodiments of the present invention. Accordingly,embodiments provide a program comprising code for implementing a systemor method as claimed in any preceding claim and a machine readablestorage storing such a program. Still further, embodiments of thepresent invention may be conveyed electronically via any medium such asa communication signal carried over a wired or wireless connection andembodiments suitably encompass the same.

All of the features disclosed in this specification (including anyaccompanying claims, abstract and drawings), and/or all of the steps ofany method or process so disclosed, may be combined in any combination,except combinations where at least some of such features and/or stepsare mutually exclusive.

Each feature disclosed in this specification (including any accompanyingclaims, abstract and drawings), may be replaced by alternative featuresserving the same, equivalent or similar purpose, unless expressly statedotherwise. Thus, unless expressly stated otherwise, each featuredisclosed is one example only of a generic series of equivalent orsimilar features.

The invention is not restricted to the details of any foregoingembodiments. The invention extends to any novel one, or any novelcombination, of the features disclosed in this specification (includingany accompanying claims, abstract and drawings), or to any novel one, orany novel combination, of the steps of any method or process sodisclosed. The claims should not be construed to cover merely theforegoing embodiments, but also any embodiments which fall within thescope of the claims.

The invention claimed is:
 1. A data processing apparatus comprising oneor more processors, the data processing apparatus being configured toperform a method of determining authentication data for authenticatingan object comprising a plurality of randomly distributed identificationelements which are detectable when electromagnetic radiation is incidentthereon, the method comprising: obtaining image data relating to morethan one of the identification elements of the object; processing theimage data to determine outline data relating to outlines of more thanone of the identification elements to which the image data relates; anddetermining the authentication data from the outline data, wherein theoutline data comprises a plurality of pixels relating to the outlines ofsaid more than one of the identification elements to which the imagedata relates, and wherein the authentication data is a measure of aspatial distribution of said pixels.
 2. The data processing apparatusaccording to claim 1 wherein the more than one identification elementsto which the outline data relates are elongate.
 3. The data processingapparatus according to claim 1 wherein the object comprises a labelcomprising the more than one identification elements to which saidoutline data relates.
 4. The data processing apparatus according toclaim 1 wherein the more than one identification elements to which theoutline data relates are embedded identification elements.
 5. The dataprocessing apparatus according to claim 1 wherein the more than oneidentification elements to which the outline data relates are printed onor affixed to or etched on the object or provided in a coating appliedto the object.
 6. The data processing apparatus according to claim 1wherein the more than one identification elements to which the outlinedata relates comprise one or more reflective, transparent,electromagnetic radiation absorbent or luminescent identificationelements.
 7. The data processing apparatus according to claim 1 whereinthe more than one identification elements to which the outline datarelates comprise one or more particles, flakes, foils, threads orfibres.
 8. The data processing apparatus according to claim 1 whereinthe more than one identification elements to which the outline datarelates are detectable by reflecting, transmitting, absorbing orabsorbing and re-emitting incident electromagnetic radiation.
 9. Thedata processing apparatus according to claim 1 wherein the more than oneidentification elements to which the outline data relates are opticallydetectable when electromagnetic radiation is incident thereon.
 10. Thedata processing apparatus according to claim 1 wherein the more than oneidentification elements to which the outline data relates are opticallydetectable by reflecting, transmitting or absorbing incidentelectromagnetic radiation having a wavelength in the range 380 nm to 700nm or by absorbing incident electromagnetic radiation and re-emittingelectromagnetic radiation having a wavelength in the range 380 nm to 700nm.
 11. The data processing apparatus according to claim 1 wherein theobject comprises a reference marker, and wherein the outline datarelates to more than one identification elements provided at a portionof the object identified with reference to the reference marker.
 12. Thedata processing apparatus according to claim 11 wherein the referencemarker is not rotationally symmetric.
 13. The data processing apparatusaccording to claim 1 wherein the outlines to which the outline datarelates comprise single pixel outlines.
 14. A device comprising the dataprocessing apparatus according to claim
 1. 15. A method of determiningauthentication data for authenticating an object comprising a pluralityof randomly distributed identification elements which are detectablewhen electromagnetic radiation is incident thereon, the methodcomprising: obtaining image data relating to more than one of theidentification elements of the object; processing the image data todetermine outline data relating to outlines of the more than one of theidentification elements to which the image data relates; and determiningthe authentication data from the outline data, wherein the outline datacomprises a plurality of pixels relating to the outlines of said morethan one of the identification elements to which the image data relates,and wherein the authentication data is a measure of a spatialdistribution of said pixels.
 16. The method of claim 15 furthercomprising causing electromagnetic radiation to be incident on the morethan one of the identification elements to which the image data relatessuch that they are detectable.
 17. A method of generating or updating anauthentication data store comprising authentication data forauthenticating an object comprising a plurality of randomly distributedidentification elements which are detectable when electromagneticradiation is incident thereon, the method comprising: determiningauthentication data for authenticating an object by the method of claim15; and storing the authentication data in the authentication datastore.
 18. The method of claim 17 further comprising: obtaining furtherimage data relating to one or more identification elements of a furtherobject; processing the further image data to determine further outlinedata relating to outline(s) of one or more of the identificationelement(s) to which said further image data relates; determining furtherauthentication data for authenticating the further object from thefurther outline data; and storing the further authentication data in theauthentication data store.
 19. A method of authenticating an objectcomprising a plurality of randomly distributed identification elementswhich are detectable when electromagnetic radiation is incident thereon,the method comprising: determining authentication data forauthenticating the object by the method of claim 15; and authenticatingthe object by way of the authentication data.
 20. The method of claim 19comprising authenticating the object by comparing the authenticationdata to predetermined authentication data from an authentication datastore.
 21. The method of claim 19 comprising authenticating the objectby: transmitting the authentication data for comparison withpredetermined authentication data from an authentication data store; andreceiving authentication result data relating to the authentication ofthe object, the authentication result data depending on a comparisonbetween the transmitted authentication data and the predeterminedauthentication data from the authentication data store.
 22. A dataprocessing apparatus comprising one or more processors, the dataprocessing apparatus being configured to perform a method of claim 15.23. A non-transitory computer readable medium comprising computerreadable code which when executed on data processing apparatus causesthe data processing apparatus to perform the method according to claim15.
 24. A non-transitory computer program product comprisinginstructions which, when the program is executed by a computer, causethe computer to carry out the method of claim
 15. 25. A computerimplemented method comprising the method of claim 15 implemented by acomputer.