اب انہیں ڈھونڈ چراغِ رخِ زیبا لے کر
آغا شورش کا شمیری ایک دن بھٹو صاحب کے پاس گئے تو بھٹو مرحوم نے کہا :آکسفورڈ یونیورسٹی میں میری لڑکی اور لڑکا دو نوں پڑھتے تھے ۔آپ بھی اپنی لڑکی اور لڑکے کو بھیج دو ،حکومت وظیفہ دے گی ۔
شورش نے کہا میں مشرقی طرزکا آ دمی ہوں ۔مغربی تہذیب میں اولاد کو بھیج کر خراب نہیں کر نا چاہتا ۔
تو بھٹو مرحوم نے کہا کہ شادمان کا لونی ،لاہورمیں دو پلاٹ پڑے ہیں ،تم کم ریٹ پر حکومت سے خرید لو اور ایک کو بیچ کر اپنا پلاٹ بنا لو ۔تو شورش نے جواب دیا :جناب سر چھپانے کے لیے جگہ موجود ہے ۔میں کوٹھی نہیں بنا نا چاہتا ۔
شورش اپنے گھر واپس آئے اور سارا قصہ اپنی بیٹی کو سنا دیا ۔تو بیٹی نے کہا کہ :ابو بھٹو صاحب پلاٹ دے رہے تھے تو لے لیتے ،سرکاری زمین ہے ہم پیسے جمع کرا دیتے ہیں بات صرف اتنی ہے کہ وہ کوئی اور لے جائے گا ۔بس ہمیں رعایت ہی مل جاتی ۔آپ نے ہمارے مستقبل کے ساتھ زیادتی کی ہے ۔
تو جواب میں شورشؒ نے فرمایا کہ :دنیا یہیں رہ جائے گی ۔میں بھٹو صاحب سے ایک ایسا تحفہ لے کر آ یا ہوں جو قبر میں مجھے کام آئے گا بس یہ بات کہنی تھی ۔
تحریک ختم نبوت کے اکابرین بھٹو مرحوم اور شورش ؒ کے درمیان کی گفتگو سے بالکل ہی لا علم تھے ۔کچھ ہی دنوں بعد شورشؒ بیمار ہوئے اور انتقال فر ما گئے ۔جنازے میں حضرت مفتی محمود صاحب ؒ مولانا غلام غوث ہزاروی ؒ ،مصطفی کھر ،کوثر نیازی ،معراج خالد ،حفیظ پیرزادہ اور دیگر حضرات شریک...
Al-Imam Nooh Ibne Abi Maryam Aljam'a is one of the well known worldly personality among the International Scholars of Science of Hadith. Unluckily, his positive personality (Ta'deel) in the Science of chain of Narrators (Ilm-e-Asmaur Rijal wa See'r) had been hidden from the sights of worldly known scholars since centuries. This research contribution is based on manuscript of Al-Istighna fee Asma el Mashooreen Bilkuna by Hafiz Ibne Abdul Bar Al-Qurtubi Al-Maliki (death: 460 hijri) found from Mufti Ilahi Bakhsh Library Kandhala India، despite of the Jarah of other scholars. The manuscript is written by Al-Hafiz Abi Abdullah Muhammad bin Abil Fatah Al-Ba'li Alhanbali (Teacher and Mentor of Al-Hafiz Al-Zahabi) (death: 709 hijri). This contribution tries to explore the personality of the great scholar as well as shower a spot light on the critic of scholars and highlight the reality of this Imam.
Revolution in generation, storage, and communication of digital information has brought about profound changes in our society. The digital information age has evolved with numerous opportunities and new challenges. The goal of this thesis is to provide a framework based on watermarking techniques that can be used for verifying the integrity of a cover work along with the recovery of the intentionally/unintentionally distorted cover work. In this context, multiple semi- fragile watermarking techniques are proposed for not only protecting the digital content from alteration but also to recover it after alteration. In these techniques, watermarks remain intact with the image under minor enhancement and is broken only in case of major manipulations. In this thesis, a hybrid scheme is developed that can both authenticate and recover the altered image. The first phase of this thesis encompasses an improvement of a self-recovery authentication scheme for digital images. The second phase then considers the reduction in computational complexity. Finally, a novel model is proposed in the third phase that not only perform accurate authentication of images but also recovers the altered image. In this thesis, the concept of multiple watermarking is employed; authentication and recovery watermarks. Both of these independent watermarks strengthen the security aspect of each other and it is user choice to use both of the watermarks or one of them according to the requirement of application. The authentication watermark is correlated to the host image for resisting collage attack and then embedded in the wavelet subbands. Unlike the conventional block-based approaches, it has the ability to determine the regions concisely where the integrity verification fails. The recovery watermark recovers the image with original quality even after manipulation of the watermarked image. Lossless compression (Huffman coding) and BCH (Bose, Ray-Chaudhuri, and Hocquenghem) coding are utilized while generating the recovery watermark. Integer DCT is utilized instead of conventional DCT because the integer DCT contents can be highly compressed by Huffman coding. In addition, integer wavelet transform, which is a fast approach of discrete wavelet transform, also reduces the computational complexity of the proposed algorithm. In contrast to the earlier authentication algorithms, the proposed techniques exploit flexibility in both of the watermarks, where a trade-off can be made by the user according to the requirement of application. Experimental investigations are performed to evaluate the performance of multiple semi-fragile watermarks. It is demonstrated that the performance of the proposed methods is better compared to the conventional block-based approaches in context of tamper detection. In summary, efficient techniques have been developed in this thesis which makes trade-off between three contradicting properties of watermarking; imperceptibility, robustness, and capacity. The proposed watermarking techniques are able to answer these questions, i) Has the image been processed? ii) Has the image been processed incidentally or maliciously? iii) Which part of the image has been processed and how much? Additionally, a self-recovery approach makes it possible to recover the exact version of the host image even after the image has been incidentally/maliciously processed.