One limited approach is to time-stamp one's data files and other progress as the project develops (check out "Trusted timestamping" on Wikipedia), but I think all that does is make perpetrating the fraud require effort over a long period of time.