کل کے سکھ تو گروی رکھے, پچھلے بوجھ اتارے
اندر اندر سلگوں لیکن نکلوں زلف سنوارے
جانتی ہوں میں تیز ہوا ہے راہ میں رستہ روکے
کون ہے ,خوشبو کے لہجے میں جا کر اسے پکارے
ایسے لگتا ہے میں خود ہی اس پہ جھولنا چاہوں
مجھ کو درد کی سولی سے اب آکے کون اتارے
اسی لیے تو نیند کی دیوی سے میں چھپنا چاہوں
روز مری آنکھوں سے کوئی آگ سے خواب گزارے
دیکھ دیکھ کے ان کو حوصلہ ملتا تو ہے مجھ کو
میری طرح سے جاگتے ہیں یہ شب بھر چاند ستارے
ایک اداسی کے دھاگے میں خود ہی بندھتی جاؤں
میری سوچوں پر یہ کون ہے خوف کے چھینٹے مارے
درد کے پیکر میں ڈھل جاتے ہیں معلوم نہیں
میری غزلیں, میری نظمیں, میرے
Allah has promised to protect Islam. That is why Allah created scholars and Sufis in different periods that served Islam and preached Islam. The preaching and propagation of Islam in India is due to these Sufis. They left their territories and came to India. One of these scholars and Sufis is Maulana Muhammad Shoaib Tordheri, known as Shaikh Sahib. He was the Shaikh of Moulana Abdul Ghafoor (Swat Babaji), that is the most famous Sufi in Swat Khyber Pakhtonkhwa and Shaikh of the Moulana Abdul Rahim Saharan Puri. Moulana Muhammad Shoaib was not a scholar and sufi, he was also a mujahid. He was martyred while fighting against the Sikhs in 1823 A.D. He wrote a book about Sufism. In his book he wrote about seeratul Nabi and companion of Prophet Muhammad S.A.W. After that he discussed circumstances and sayings of Sufis of the all four series (Naqshbandia, Qadria, Cheshtia and Saharwardia) of Sufism. He also described the attributes of the perfect Peer.
Due to the rapid development of multimedia and communications technologies, issues related to data vulnerability and copyrights violation has increased. Digital content can be manipulated and reproduced effortlessly. Consequently, there is a considerable requirement for techniques aimed at content protection and authentication. Watermarking techniques can provide copyrights enforcement and authentication to prevent the illegitimate use of digital content. These techniques can be classified into two categories i.e. robust watermarking and reversible watermarking. In this thesis, research work is carried out in three phases. The first phase proposes a robust watermarking technique, which is resilient against the geometrical attacks. It is helpful in executing copyright protection. In robust watermarking, watermark is able to survive in case of attack on the digital content and can be successfully retrieved on extraction. The proposed technique exploits both the robust image feature points and local Zernike moments for embedding secret information. Delaunay tessellation is employed to divide an image into distinct triangular segments based on robust features identified using Harris detector. Zernike moments are calculated for each selected triangular segment, and then the watermark is embedded in the magnitude of Zernike moments using dither modulation. In the second phase, a reversible watermarking technique is proposed. Reversible watermarking is a special type of watermarking technique in which watermark is extracted along with restoration of the host media. Whereas, in case of robust watermarking, we are not able to retrieve the original image. Such watermarking system finds its application in medical and law enforcement, etc. The proposed watermarking scheme is based on pixel value ordering. Image is divided into sub blocks and each block is assessed using a threshold value. If the block belongs to the smooth category, watermark bit is embedded. In contrast, if it is classified as rough block, then the sub block is left unchanged. This technique does not require a location map since it uses histogram shifting. In third phase, the watermarking approaches and their applications for the protection DNA sequences are explored. In DNA watermarking, which is type of text watermarking; watermark information should be embedded in DNA sequence in such a way that it should not raise any functional disorders in the living organism. A watermark is embedded in a DNA sequence through synonymous substitution of nucleotides. The proposed approach ensures Amino Acid conservation, efficient utilization of the available embedding space in DNA sequences, and achieves mutation resistance by since it employs Reed-Solomon codes. The performance of these techniques has been evaluated on the standard test datasets. In some of the cases, the proposed watermarking approaches performed better than the recent existing approaches and showed comparable performance in other cases. The first technique finds its application in protecting the copyrights of the owner. The second watermarking technique can be used in applications where significant amount of data needs to be embedded e.g. information related to the patient in medical images. The third technique related to the DNA watermarking can be used for protection of DNA sequences and also to provide biological data storage as large amount of data can be stored.