Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

کامل مرشد دی پہچان

کامل مُرشد دی پہچان

پھڑ دامن پیر منا لَے توں
اِنج سوکھا ای رب نوں پا لَے توں
رکھ پہلی پوڑی پیر میاں
انج کردا جا توں سیر میاں
تیری ہر دم ہووے خیر میاں
من اپنے نوں سمجھا لَے توں
پھڑ دامن پیر منا لَے توں
پھڑ مرشد کر انکار نہیں
بنِ مرشد بیڑا پار نہیں
لینی ہور کسے وی سار نہیں
اُس در تے ڈیرے لا لَے توں
پھڑ دامن پیر منا لَے توں
اوہ بستی یار مدینہ ہے
اوتھے ملدا نور خزینہ ہے
اوتھے ہوندا ٹھنڈا سینہ ہے
کر ہمت درشن پا لَے توں
پھڑ دامن پیر منا لَے توں

سوہنا مرشد ماڑی والا اے
جس کیتا نور اجالا اے
سدا وسن جھوکاں شالا اے
اُس در توں فیض کما لَے توں
پھڑ دامن پیر منا لَے توں

ایہو طرز طریقہ سارا جے
ایہو سب توں راز نیارا جے
اُس رب دا نام پیارا جے
اُس نام دا ورد پکا لَے توں
پھڑ دامن پیر منا لَے توں

ڈِٹھا خواجہ عبد رحمن میاں
ہِن دُھماں وچ جہان میاں
جتھے جھکدے شاہ سلطان میاں
اُس در توں فقر کما لَے توں
پھڑ دامن پیر منا لَے توں

اوہ مٹھا ہے خلق طبیعت دا
پابند اے بڑا شریعت دا
اوہ اچھا ہے ذہنیت دا
اوہدے در تے کلّی پا لَے توں
پھڑ دامن پیر منا لَے توں

اوہدا میتھوں سن توں حالا نی
اوہدا بہتا شان نرالا نی
اوہدا وارث کملی والا نی
اُس در تے جوگ کما لَے توں
پھڑ دامن پیر منا لَے توں

وچ ماڑی جھوکاں لائیاں نیں
اوتھے ذکری جلیاں پائیاں نیں
گیاں ہر جاء ہو...

حسین بن منصور حلاج اور ان کی صوفیانہ تعلیمات کا علمی وتحقیقی جائزہ

A Sufi poet, teacher and philosopher, Hallaj was executed on the orders of an Abbasside caliph for uttering these words, taken to mean Hallaj as claiming himself to be God. After more than a decade of imprisonment, Hallaj was eventually executed publically in Baghdad in the year 922. He is seen by many as a revolutionary writer and teacher of his time, when practices of mysticism were not meant to be shared publically. Yet he remains a controversial figure, revered by Rumi, hated by many, he was labeled an intoxicated Sufi and is still read today. After his arrest in Sūs and a lengthy period of confinement (c. 911–922) in Baghdad, al-Ḥallāj was eventually crucified and brutally tortured to death. A large crowd witnessed his execution. He is remembered to have endured gruesome torture calmly and courageously and to have uttered words of forgiveness for his accusers. In a sense, the Islāmic community (ummah) had put itself on trial, for al-Ḥallāj left behind revered writings and supporters who courageously affirmed his teachings and his experience. In subsequent Islāmic history, therefore, the life and thought of al-Ḥallāj has been a subject seldom ignored. Here we get a realistic overview about him and his teachings.

Secure Communication Using Steganography in Image Processing

Research in information security and secrecy is becoming more and more important, as well as, demanding as the information is exponentially exploding. There has been a good bit of focus on cryptography, but with cryptanalysis and crypto attacks, researches have looked into the alternative means, like steganography. Steganography conceals the message into the cover file. In this dissertation we have focused on image steganography and we have tried to improve the key parameters of the system which are capacity, imperceptibility and robustness. In the first part of the thesis the presented work comprises of two contributions. In the first contribution the secret information is preprocessed by using latest devised right translated gray substitution box and BCH error correction codes. This process enhances the security of the information as data retrieval is impossible without the information of mapping rule applied and secret key. Differential embedding to the LSBs of optimized chaotically selected pixels through GA is another step to make detection difficult and avoid error to propagate. In second contribution we introduce an advance technique for embedding based on representing cover image pixels using a new 13-bit prime series representation resulting into 3-times increase in capacity. The payload has been reduced by applying 2D DCT to secret image and thresholding of the coefficients ensuring high imperceptibility. An innovative algorithm has also been proposed to ensure the uniform spread of message into the cover image by adjusting average separation between the chaotically selected pixels of cover image for embedding based on size of secret information and cover image In the second part of the thesis the presented work is an application of compressed sensing. The main advantage we have gained is the huge increase in security of the information along with the payload reduction. Utilizing compressed sensing made the system more secure as reconstruction of the data is impossible without knowing the measurement basis, as the generation process of measurement basis is random and requires huge computations to predict them. We have presented two problems. The first contribution focuses on combining compressive sensing and steganography to enhance security of image steganography. The secret image is encrypted and compressed using compressive sensing. The encrypted data is then embedded to randomly selected pixels of cover image using a secret chaotic key. Simulation results presented show the efficient recovery and reconstruction of secret image using reduced payload. In the second contribution we have focused on security and payload capacity enhancement of an image steganography system for an audio message by using compressed sensing theory. However, in order to utilize compressed sensing, the audio message is first converted to an equivalent grayscale image which is sparsified using 2D-DCT and thresholding. The sparsified image is further compressed using the proposed compressed sensing algorithm which enhances the security to a high level and also payload capacity improves significantly, without losing imperceptibility of the system. The compressed image is embedded in chaotically chosen pixels of the cover image. At receiver the compressed sensing reconstruction algorithm is used to reconstruct the grayscale image which is then converted back to the audio message. Presented results indicate that the proposed system is highly imperceptible, secure and robust against various image processing attacks. It is able to reconstruct secret audio message with high PSNR value.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.