The Power of Linear Reconstruction Attacks.
Shiva Prasad KasiviswanathanMark RudelsonAdam D. SmithPublished in: SODA (2013)
Keyphrases
- power consumption
- inverse problems in image processing
- three dimensional
- linear systems
- watermarking scheme
- malicious users
- terrorist attacks
- countermeasures
- reconstructed image
- data sets
- closed form
- image reconstruction
- computer security
- compressed sensing
- security risks
- image quality
- image processing
- neural network