Investigating Privacy Leakage in Dimensionality Reduction Methods via Reconstruction Attack