OPTIMIZING FACIAL RECOGNITION WITH THE CUDA ACCELERATED DLIB LIBRARY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2026.32.1154

Keywords:

cybersecurity, comprehensive security systems, facial recognition, dlib, CUDA, GPU acceleration, computer vision, video surveillance, biometric identification, CNN, HOG, Python, machine learning, computational optimization, benchmarking

Abstract

This work presents a comprehensive study of the effectiveness of computer vision methods for the task of detecting faces in images and in video streams. The main attention is paid to the comparative analysis of two algorithms of the dlib library: the classical method based on histograms of oriented gradients (HOG) and the modern method based on convolutional neural networks (CNN). The problem of high computational complexity of neural network methods is considered and a solution is proposed through the use of NVIDIA CUDA parallel computing technology. A software algorithm for benchmarking is developed, which allows for automatic evaluation of frame processing speed (FPS), inference time and detection stability on different hardware. The experiment proved that the use of a graphics processor (GPU) allows achieving multiple acceleration (speedup) of image processing when using CNN, providing the ability to work in real time with high accuracy. The results of the study allow us to determine the optimal hardware and software configurations for building video surveillance, access control, and biometric identification systems. The conclusions obtained can be used in the design of high-load video analytics systems.

Downloads

Download data is not yet available.

References

King, D. E. (2015). Max-margin object detection. Journal of Machine Learning Research, 16, 1113–1120. https://doi.org/10.48550/arXiv.1502.00046

Dalal, N., & Triggs, B. (2005). Histograms of oriented gradients for human detection. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR). https://doi.org/10.1109/CVPR.2005.177

Shanahan, J. G. (2020). Introduction to computer vision and real-time deep learning-based object detection. In Proceedings of the 29th ACM International Conference on Information & Knowledge Management (CIKM 2020) (pp. 3515–3516). https://doi.org/10.1145/3340531.3412177

Mozaffari, M. H. (2025). Deep learning for computer vision applications. Electronics, 14, 2874. https://doi.org/10.3390/electronics14142874

Chen, Y., Wang, S., Lin, L., Cui, Z., & Zong, Y. (2024). Computer vision and deep learning transforming image recognition and beyond. International Journal of Computer Science and Information Technology, 2(1), 45–51. https://doi.org/10.62051/ijcsit.v2n1.06

International Journal of Computer Science and Information Technology. (2023). Based on intelligent advertising recommendation and abnormal advertising monitoring system in the field of machine learning. International Journal of Computer Science and Information Technology, 1(1), 17–23. https://doi.org/10.62051/ijcsit.v1n1.03

Tan, K., et al. (2024). Integrating advanced computer vision and AI algorithms for autonomous driving systems. Journal of Theory and Practice of Engineering Science, 4(1), 41–48. https://doi.org/10.53469/jtpes.2024.04(01).06

International Journal of Computer Science and Information Technology. (2023). A deep learning-based algorithm for crop disease identification positioning using computer vision. International Journal of Computer Science and Information Technology, 1(1), 85–92. https://doi.org/10.62051/ijcsit.v1n1.12

Kuznetsov, O., Smirnov, O., Kuznetsova, T., Shaikhanova, A., & Svatowsky, I. (2025). Privacy-utility trade-offs in IoT networks: A comparative analysis of differential privacy mechanisms for sensor data aggregation. In Security and privacy of cyber-physical systems: Emerging trends, technologies and applications (pp. 589–622).

Kuznetsov, O., Smirnov, O., Akhmetov, B., Alimseitova, Z., & Imoize, A. L. (2025). Deep learning frontiers in copy-move forgery detection: Advances, challenges, and future directions. In Advancements in cybersecurity: Next-generation systems and applications (pp. 202–229). https://doi.org/10.1201/9781003546153

Al-Azzeh, J., Ayyoub, B., Mesleh, A., Smirnova, T., Gnatyuk, S., Drieiev, O., Smirnov, O., & Dorenskyi, O. (2025). Cloud-based information system for evaluating caverns in the process of blasting metal surfaces of details. International Review on Modelling and Simulations, 18(1), 32–42. https://doi.org/10.15866/iremos.v18i1.25596

Smirnov, O., Fedorov, E., Neskorodieva, A., & Neskorodieva, T. (2024). Intellectual classification method of gymnastic elements based on combinations of descriptive and generative approaches. CEUR Workshop Proceedings, 3664, 11–23.

Kuznetsov, O., Frontoni, E., Kuznetsova, Y., Smirnov, O., & Chevardin, V. (2023). Achieving enhanced security in biometric authentication: A rigorous analysis of code-based fuzzy extractor. CEUR Workshop Proceedings, 3624, 330–339.

Smirnov, O., Karapetyan, A., & Fedorov, E. (2022). Creating neural network and human-based metaheuristic methods for solving the traveling salesman problem. CEUR Workshop Proceedings, 3312, 47–58.

Smirnov, O., Neskorodieva, T., Fedorov, E., Rudakov, K., & Neskorodieva, A. (2022). Method for detecting audit data anomalies based on restricted Cauchy machine. CEUR Workshop Proceedings, 3187, 1–12.

Smirnov, O., Smirnova, T., Al-Oraiqat, A. M., Drieiev, O., Polishchuk, L., Khan, S., Hasan, M. Y., Amro, A. M., & AlRawashdeh, H. S. (2022). Method for determining treated metal surface quality using computer vision technology. Sensors, 22(16), 6223. https://doi.org/10.3390/s22166223

Lysenko, I., Minailenko, R., Smirnov, S., Buravchenko, K., Yakymenko, N., & Smirnov, O. (2025). Study of artificial intelligence tools for intelligent data analysis. Cybersecurity: Education, Science, Technique, 3(31), 227–241. https://doi.org/10.28925/2663-4023.2025.31.1022

Smirnov, O. A., Konstantynova, L. V., Konoplitska-Slobodeniuk, O. K., Kozirova, N. V., Yakymenko, N. M., Dorenskyi, O. P., & Buravchenko, K. O. (2025). Study of artificial intelligence tools for database management and data analysis. Cybersecurity: Education, Science, Technique, 3(27), 429–448. https://doi.org/10.28925/2663-4023.2025.27.763

King, D. E. (n.d.). Dlib C++ library documentation. http://dlib.net

NVIDIA. (n.d.). CUDA programming guide. https://docs.nvidia.com/cuda/

Rosebrock, A. (2017). Deep learning for computer vision with Python. PyImageSearch. https://dokumen.pub/deep-learning-for-computer-vision-with-python-starter-bundle.html

Downloads


Abstract views: 0

Published

2026-03-26

How to Cite

Смірнов, О., Zaritskyi, V., Buravchenko, K., Konoplitska-Slobodeniuk, O., Konstantynova, L., Yakymenko , N., & Smirnov, S. (2026). OPTIMIZING FACIAL RECOGNITION WITH THE CUDA ACCELERATED DLIB LIBRARY. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(32), 573–582. https://doi.org/10.28925/2663-4023.2026.32.1154

Most read articles by the same author(s)

1 2 > >>