ثانیثی ادب اور تنقید مخصوص جنسی گروہ کے لیے قلم بند کی جاتی ہے۔ جس کے لکھنے والے اور قاری مخصوص جنسی گروہ سور رجحان سے وابستہ ہوتے ہیں۔ کیونکی اس جنسی گروہ کا معاشرے میں مخصوص کردار ہوتا ہے۔ 1960 میں یہ روئیے جدید رنگوں مین ایک عمرانیاتی شعور کے ساتھ ہمارے مطالعوں اور سوچوں کا حصہ بنے۔ثانیثیت {FEMINISM} کے معاشرتی اور ادبی نظریاتی مطالعات میں جنسی تعصّبات کے حوالے سے بہت حساس رہا ہے۔اس کے سکہ بند تصورات پر سوالات بھی اٹھاتی ہے۔ ثانیثی تنقید میں مارکسی، فرائدین، ساختیاتی پس ثانیثی تنقید، رد ثانیثی تنقید، نئی ثانیثی تنقید، نسلی اور مذھبی ثانیثیت تناظر میں اپنی اپنی تعبیرات اور تفاسیر بیان کی گئی ہیں۔ اس کو عورت کی مزاحمت اور احتجاج کا نظریہ بھی کہا جاتا ہے۔ جو عورتوں کے بارے میں تصورات، مفروضات کو منفرد سیاق و سباق عطا کرتے ہیں۔ کہا جاتا ہے ثانیثی ادب کے متن میں کچھ امور اور معاملات ایسے ہوتے ہیں جن کو اسے صرف عورت ہی سمجھ سکتی ہے۔اور سمجھا سکتی ہے۔ کیونکہ عورت کے تجربات اور حساسیّت کو مرد کلی طور پر سمجھ نہیں پاتا۔ مارکسی فکریات میں ثانیثیت سے کچھ زیادہ دلچسپی اور ہمدردی کے جذبات نظر نہیں آتے کیونکہ یساریت پسند فکریات میں طبقاتی درجہ بندی میں خواتین کا علحیدہ وجود تسلیم نہیں کیا جاتا۔ اسی طرح فرائڈ کی فکر میں انسانی تعلقات کے عمل کیمیائی و انسلاکات اور بین العمل میں مرد کا آلہ تناسل کو ثانیثی تجزیات سے منسلک کردیتا ہے۔ جو شارح اور رہنما بھی ہے۔ جو قوت مقتدر بھی ہے۔ سوال یہ ہے کہ کیا ثانیثی تنقید اور مطالعوں کے زریعے عورت اپنے مادّی نظام کی گم شدہ شجرہ نسب کو دریافت کرسکتی ہے۔ حیدرقریشی نے رقم طراز ہیں " صدیوں سے انسانی معاشرہ میں عورت کو کم تر درجہ دیا گیا...
Islam is a complete code of life. It provides injunctions for every field of life. In economics it not only provides us details in finance and trade but also provides us information about "Halal & Haram". Needless to emphasize that economy plays an important role in the development of nation and financial matters cannot be ignored if development is a target. According to Islamic teachings all earnings must be lawful. Generally, new ways are being adopted to increase and generate wealth. Islam encourages to get more wealth and profit but no illegal means should be adopted for that. All kinds of fraud and unfair means while doing business must be avoided. Islam lays stress on using lawful and valid means in all economic activities. Scholars of Sub-continent have different opinions about the prevailing prize money schemes. Some scholars consider them lawful regarding some aspects but majority term them unlawful.
In the last decade, watermarking applications have increased considerably. The main reason is that watermarking has emerged as a prospective technique, which can provide copyright protection and authentication of digital content. However, the disadvantage of watermarking is that it introduces small modifications in the original work and thus causes slight degradation. These modifications may be undesirable in some sensitive applications, like medical imagery, 3D reconstruction, and military applications. As a remedy to this problem, researchers have introduced the concept of reversible watermarking. The main objective of reversible watermarking scheme is to restore the watermarked image to its original state after watermark extraction. In this thesis, new reversible watermarking techniques as well as their novel applications are presented. In some of these techniques, computational intelligence (CI) approaches have been employed to improve the watermark capacity versus imperceptibility tradeoff. The research work is carried out in four phases. In the first phase, reversible watermarking is employed on medical imagery, which comprises regions of sensitive information. Slight modification in these regions affects the diagnostic analysis and thus can lead to wrong decisions. For this purpose, a novel reversible watermarking technique has been developed that utilizes genetic algorithm (GA) to improve capacity versus imperceptibility tradeoff. The algorithm makes use of block based companding technique, which helps in increasing the watermark capacity. Experimental analysis depicts that the developed watermarking technique provides good performance compared to the existing approaches. As the technique is reversible, therefore, it is even capable of embedding in the sensitive regions of the image. Reversible watermarking of images with depth information is discussed in the second phase of this work. 3D imaging is widely used in 3D gaming, robotics, controlling and routing devices etc. Different techniques and algorithms are reported to compute the depth information of an object. In this phase, depth information is computed through shape from focus algorithm. The depth information is reversibly embedded in its corresponding 2D image. This technique also utilizes GA to compute near-optimal threshold matrix for performance improvement in terms of capacity versus imperceptibility tradeoff. An additional attribute is achieved by using the threshold matrix for authentication purpose. The third phase focuses on reversible watermarking of 3D camera images. 3D cameras work on different principles for depth map computation. Cameras working on time of flight principle for depth Reversible Watermarking and Its Applications Page xviii map calculation are used in the experimental analysis of the proposed technique. The developed technique utilizes 3D information to embed as a watermark. In this way, protection and secure transmission of an image along with its corresponding depth map is provided. Two CI approaches, namely, differential evolution and a hybrid approach (comprising particle swarm optimization and differential evolution) are utilized to optimize the capacity and imperceptibility tradeoff. This technique is also able to provide authentication capability against manipulation and collage attacks. In the first three phases, CI is exploited to improve the performance of the proposed reversible watermarking techniques. However, CI approaches are more time and resource consuming. Therefore, in fourth phase, a novel and fast reversible watermarking technique is proposed based on histogram processing and down sampling. Histogram based reversible watermarking techniques are easy to implement and are computationally less expensive. A concept of down sampling is employed to generate a reference image and thus create more space for hiding bits. Block selection is used to generate a location map. However, the location map is required at the receiving side to perform extraction and recovery processes. An additional use of location map is devised, which makes the technique capable of authenticating digital images.