Recovering simple signals

The primary goal of compressed sensing and (non-adaptive) combinatorial group testing is to recover a sparse vector x from an underdetermined set of linear equations Φx = y. Both problems entail solving Φx = y given Φ and y but they use different models of arithmetic, different models of randomness models for F, and different guarantees upon the solution x and the class of signals from which x is drawn. In [1], Lipton introduced a model for error correction where the channel is computationally bounded, subject to standard cryptographic assumptions, and produces the error vector x that must be found and then corrected. This has been extended in [2], [3] to create more efficient schemes against polynomial and logspace bounded channels. Inspired by these results in error correction, we view compressed sensing and combinatorial group testing as an adversarial process, where Mallory the adversary produces the vector x to be measured, with limited information about the matrix Φ. We define a number of computationally bounded models for Mallory and show that there are significant gains (in the minimum number of measurements) to be had by relaxing the model from adversarial to computationally or information-theoretically bounded, and not too much (in some cases, nothing at all) is lost by assuming these models over oblivious or statistical models. We also show that differences in adversarial power give rise to different lower bounds for the number of measurements required to defeat such an adversary. By contrast we show that randomized one pass log space streaming Mallory is almost as powerful as a fully adversarial one for group testing while for compressed sensing such an adversary is as weak as an oblivious one.

[1]  David J Brady,et al.  Fiber-optic localization by geometric space coding with a two-dimensional gray code. , 2005, Applied optics.

[2]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[3]  Ravi Kumar,et al.  The One-Way Communication Complexity of Hamming Distance , 2008, Theory Comput..

[4]  Richard G. Baraniuk,et al.  A new compressive imaging camera architecture using optical-domain compression , 2006, Electronic Imaging.

[5]  Volkan Cevher,et al.  Model-Based Compressive Sensing , 2008, IEEE Transactions on Information Theory.

[6]  Ely Porat,et al.  Approximate Sparse Recovery: Optimizing Time and Measurements , 2012, SIAM J. Comput..

[7]  David L Donoho,et al.  Compressed sensing , 2006, IEEE Transactions on Information Theory.

[8]  Richard G. Baraniuk,et al.  Compressive imaging for video representation and coding , 2006 .

[9]  Raghunandan M Kainkaryam,et al.  Pooling in high-throughput drug screening. , 2009, Current opinion in drug discovery & development.

[10]  David P. Woodruff,et al.  Lower bounds for sparse recovery , 2010, SODA '10.

[11]  R. DeVore,et al.  Compressed sensing and best k-term approximation , 2008 .

[12]  D. Du,et al.  Combinatorial Group Testing and Its Applications , 1993 .

[13]  Graham Cormode,et al.  What's hot and what's not: tracking most frequent items dynamically , 2003, TODS.

[14]  Jack K. Wolf,et al.  Born again group testing: Multiaccess communications , 1985, IEEE Trans. Inf. Theory.

[15]  Marc Mézard,et al.  Group Testing With Random Pools: Optimal Two-Stage Algorithms , 2007, IEEE Transactions on Information Theory.

[16]  Dimitris Achlioptas,et al.  Database-friendly random projections , 2001, PODS.

[17]  Stephen Howard,et al.  A sublinear algorithm for sparse reconstruction with ℓ2/ℓ2 recovery guarantees , 2008, 2009 3rd IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).

[18]  Atri Rudra,et al.  Efficiently Decodable Error-Correcting List Disjunct Matrices and Applications - (Extended Abstract) , 2011, ICALP.

[19]  V. V. Rykov,et al.  Superimposed distance codes , 1989 .

[20]  Richard J. Lipton,et al.  A New Approach To Information Theory , 1994, STACS.

[21]  S. Kirolos,et al.  Random Sampling for Analog-to-Information Conversion of Wideband Signals , 2006, 2006 IEEE Dallas/CAS Workshop on Design, Applications, Integration and Software.

[22]  Emanuel Knill,et al.  Lower bounds for identifying subset members with subset queries , 1994, SODA '95.

[23]  R. Baraniuk,et al.  Compressive Radar Imaging , 2007, 2007 IEEE Radar Conference.

[24]  Jaikumar Radhakrishnan,et al.  Deterministic restrictions in circuit complexity , 1996, STOC '96.

[25]  Noam Nisan,et al.  On Randomized One-round Communication Complexity , 1995, STOC '95.

[26]  Ely Porat,et al.  Sublinear time, measurement-optimal, sparse recovery for all , 2012, SODA.

[27]  Silvio Micali,et al.  Optimal Error Correction Against Computationally Bounded Noise , 2005, TCC.

[28]  Volkan Cevher,et al.  Sparse Signal Recovery Using Markov Random Fields , 2008, NIPS.

[29]  Ding-Zhu Du,et al.  A survey on combinatorial group testing algorithms with applications to DNA Library Screening , 1999, Discrete Mathematical Problems with Medical Applications.

[30]  Deanna Needell,et al.  CoSaMP: Iterative signal recovery from incomplete and inaccurate samples , 2008, ArXiv.

[31]  Mikhail J. Atallah,et al.  Indexing Information for Data Forensics , 2005, ACNS.

[32]  Peter J. Woolf,et al.  poolHiTS: A Shifted Transversal Design based pooling strategy for high-throughput drug screening , 2008, BMC Bioinformatics.

[33]  S. Kirolos,et al.  Analog-to-Information Conversion via Random Demodulation , 2006, 2006 IEEE Dallas/CAS Workshop on Design, Applications, Integration and Software.

[34]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1951 .

[35]  Prakash Narayan,et al.  Reliable Communication Under Channel Uncertainty , 1998, IEEE Trans. Inf. Theory.

[36]  M. Vidal,et al.  Shifted Transversal Design smart-pooling for high coverage interactome mapping. , 2009, Genome research.

[37]  G. Hannon,et al.  DNA Sudoku--harnessing high-throughput sequencing for multiplexed specimen analysis. , 2009, Genome research.

[38]  Rami G. Melhem,et al.  Live Baiting for Service-Level DoS Attackers , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[39]  Emmanuel J. Candès,et al.  Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.

[40]  Milton Sobel,et al.  Binomial Group-Testing With an Unknown Proportion of Defectives* , 1966 .

[41]  E. Candès,et al.  Error correction via linear programming , 2005, FOCS 2005.

[42]  Thierry Blu,et al.  Sampling signals with finite rate of innovation , 2002, IEEE Trans. Signal Process..

[43]  Zoltán Füredi On r-Cover-free Families , 1996, J. Comb. Theory, Ser. A.

[44]  Aravind Srinivasan,et al.  Chernoff-Hoeffding bounds for applications with limited independence , 1995, SODA '93.

[45]  R. Dorfman The Detection of Defective Members of Large Populations , 1943 .

[46]  Deanna Needell,et al.  Signal Recovery From Incomplete and Inaccurate Measurements Via Regularized Orthogonal Matching Pursuit , 2007, IEEE Journal of Selected Topics in Signal Processing.

[47]  S. Verdú,et al.  Noiseless Data Compression with Low-Density Parity-Check Codes , 2003, Advances in Network Information Theory.

[48]  Ely Porat,et al.  Search Methodologies , 2022 .

[49]  Ting Sun,et al.  Single-pixel imaging via compressive sampling , 2008, IEEE Signal Process. Mag..

[50]  Donald F. Towsley,et al.  Random Multiple-Access Communication and Group Testing , 1984, IEEE Trans. Commun..

[51]  Venkatesan Guruswami,et al.  Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.