International Research Association of Computer Science and Technology (IRACST)
"Theft identification during data transfer can be elaborated as in when a data distributor has given sensitive data to the trusted agents and some of the data is leaked and found in an unauthorized place. For this the system can use data allocation strategies or can also inject ""Realistic but fake"" data records to improve identification of leaked data and who leaks the data. The fake objects looks exactly like original data in which the agents cannot be identified. Many of the data from the organization can be mostly leaked through the e-mails."