OPTIMIZING FACIAL RECOGNITION WITH THE CUDA ACCELERATED DLIB LIBRARY
DOI:
https://doi.org/10.28925/2663-4023.2026.32.1154Keywords:
cybersecurity, comprehensive security systems, facial recognition, dlib, CUDA, GPU acceleration, computer vision, video surveillance, biometric identification, CNN, HOG, Python, machine learning, computational optimization, benchmarkingAbstract
This work presents a comprehensive study of the effectiveness of computer vision methods for the task of detecting faces in images and in video streams. The main attention is paid to the comparative analysis of two algorithms of the dlib library: the classical method based on histograms of oriented gradients (HOG) and the modern method based on convolutional neural networks (CNN). The problem of high computational complexity of neural network methods is considered and a solution is proposed through the use of NVIDIA CUDA parallel computing technology. A software algorithm for benchmarking is developed, which allows for automatic evaluation of frame processing speed (FPS), inference time and detection stability on different hardware. The experiment proved that the use of a graphics processor (GPU) allows achieving multiple acceleration (speedup) of image processing when using CNN, providing the ability to work in real time with high accuracy. The results of the study allow us to determine the optimal hardware and software configurations for building video surveillance, access control, and biometric identification systems. The conclusions obtained can be used in the design of high-load video analytics systems.
Downloads
References
King, D. E. (2015). Max-margin object detection. Journal of Machine Learning Research, 16, 1113–1120. https://doi.org/10.48550/arXiv.1502.00046
Dalal, N., & Triggs, B. (2005). Histograms of oriented gradients for human detection. In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR). https://doi.org/10.1109/CVPR.2005.177
Shanahan, J. G. (2020). Introduction to computer vision and real-time deep learning-based object detection. In Proceedings of the 29th ACM International Conference on Information & Knowledge Management (CIKM 2020) (pp. 3515–3516). https://doi.org/10.1145/3340531.3412177
Mozaffari, M. H. (2025). Deep learning for computer vision applications. Electronics, 14, 2874. https://doi.org/10.3390/electronics14142874
Chen, Y., Wang, S., Lin, L., Cui, Z., & Zong, Y. (2024). Computer vision and deep learning transforming image recognition and beyond. International Journal of Computer Science and Information Technology, 2(1), 45–51. https://doi.org/10.62051/ijcsit.v2n1.06
International Journal of Computer Science and Information Technology. (2023). Based on intelligent advertising recommendation and abnormal advertising monitoring system in the field of machine learning. International Journal of Computer Science and Information Technology, 1(1), 17–23. https://doi.org/10.62051/ijcsit.v1n1.03
Tan, K., et al. (2024). Integrating advanced computer vision and AI algorithms for autonomous driving systems. Journal of Theory and Practice of Engineering Science, 4(1), 41–48. https://doi.org/10.53469/jtpes.2024.04(01).06
International Journal of Computer Science and Information Technology. (2023). A deep learning-based algorithm for crop disease identification positioning using computer vision. International Journal of Computer Science and Information Technology, 1(1), 85–92. https://doi.org/10.62051/ijcsit.v1n1.12
Kuznetsov, O., Smirnov, O., Kuznetsova, T., Shaikhanova, A., & Svatowsky, I. (2025). Privacy-utility trade-offs in IoT networks: A comparative analysis of differential privacy mechanisms for sensor data aggregation. In Security and privacy of cyber-physical systems: Emerging trends, technologies and applications (pp. 589–622).
Kuznetsov, O., Smirnov, O., Akhmetov, B., Alimseitova, Z., & Imoize, A. L. (2025). Deep learning frontiers in copy-move forgery detection: Advances, challenges, and future directions. In Advancements in cybersecurity: Next-generation systems and applications (pp. 202–229). https://doi.org/10.1201/9781003546153
Al-Azzeh, J., Ayyoub, B., Mesleh, A., Smirnova, T., Gnatyuk, S., Drieiev, O., Smirnov, O., & Dorenskyi, O. (2025). Cloud-based information system for evaluating caverns in the process of blasting metal surfaces of details. International Review on Modelling and Simulations, 18(1), 32–42. https://doi.org/10.15866/iremos.v18i1.25596
Smirnov, O., Fedorov, E., Neskorodieva, A., & Neskorodieva, T. (2024). Intellectual classification method of gymnastic elements based on combinations of descriptive and generative approaches. CEUR Workshop Proceedings, 3664, 11–23.
Kuznetsov, O., Frontoni, E., Kuznetsova, Y., Smirnov, O., & Chevardin, V. (2023). Achieving enhanced security in biometric authentication: A rigorous analysis of code-based fuzzy extractor. CEUR Workshop Proceedings, 3624, 330–339.
Smirnov, O., Karapetyan, A., & Fedorov, E. (2022). Creating neural network and human-based metaheuristic methods for solving the traveling salesman problem. CEUR Workshop Proceedings, 3312, 47–58.
Smirnov, O., Neskorodieva, T., Fedorov, E., Rudakov, K., & Neskorodieva, A. (2022). Method for detecting audit data anomalies based on restricted Cauchy machine. CEUR Workshop Proceedings, 3187, 1–12.
Smirnov, O., Smirnova, T., Al-Oraiqat, A. M., Drieiev, O., Polishchuk, L., Khan, S., Hasan, M. Y., Amro, A. M., & AlRawashdeh, H. S. (2022). Method for determining treated metal surface quality using computer vision technology. Sensors, 22(16), 6223. https://doi.org/10.3390/s22166223
Lysenko, I., Minailenko, R., Smirnov, S., Buravchenko, K., Yakymenko, N., & Smirnov, O. (2025). Study of artificial intelligence tools for intelligent data analysis. Cybersecurity: Education, Science, Technique, 3(31), 227–241. https://doi.org/10.28925/2663-4023.2025.31.1022
Smirnov, O. A., Konstantynova, L. V., Konoplitska-Slobodeniuk, O. K., Kozirova, N. V., Yakymenko, N. M., Dorenskyi, O. P., & Buravchenko, K. O. (2025). Study of artificial intelligence tools for database management and data analysis. Cybersecurity: Education, Science, Technique, 3(27), 429–448. https://doi.org/10.28925/2663-4023.2025.27.763
King, D. E. (n.d.). Dlib C++ library documentation. http://dlib.net
NVIDIA. (n.d.). CUDA programming guide. https://docs.nvidia.com/cuda/
Rosebrock, A. (2017). Deep learning for computer vision with Python. PyImageSearch. https://dokumen.pub/deep-learning-for-computer-vision-with-python-starter-bundle.html
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Олексій Смірнов, Віктор Заріцкий , Костянтин Буравченко , Оксана Конопліцька-Слободенюк, Лілія Константинова , Наталія Якименко , Сергій Смірнов

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.