Abstract
Hedging at-the-money digital options near maturity, remains a challenge in quantitative finance. In the present work, we carry out a hedging strategy by means of a bull spread. We study the probability of super- and sub-hedge the digital option and minimize the probability of a sub-hedge considering the cost of hedging and illiquidity issues. We perform a wide variety of numerical experiments under different models for the underlying asset dynamics. A calibration to market data is provided and used to get the optimal composition of the bull spread satisfying the cost of hedging restriction.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Hedgers of derivatives wish to replicate the opposite payoff of their positions. Hedging strategies can be roughly classified as dynamic or static. Dynamic hedging requires constant re-balancing of portfolios as relevant prices change over time. On the contrary, static hedging does not need to re-balance portfolios. Comparisons on dynamic and static hedging strategies for barrier options, Asian options, lookback options and quanto options are presented in Engelmann et al. (2006) and Tompkins (2002). A combination of dynamic and static hedges for exotic options is presented in İlhan et al. (2009), and numerous methodologies for dynamic hedging are shown in Zakamouline (2009).
A problem that remains a challenge in quantitative finance is the hedging of at-the-money digital options near maturity. The problem stems from the fact that a digital option has a discontinuous payoff at the strike price and has a huge delta and gamma near expiration. This problem is well-known among practitioners, and it is also put forward in Zakamouline (2009), where the author touches upon the delta-hedging of digital options. Hedging errors for digital options are studied in Gallus (1999). The author shows that even if one is correct in assuming a geometric Brownian motion (GBM) model for the distribution of the underlying risky asset, a delta-hedging strategy with a wrong volatility for a digital option position may actually increase the risk compared to the alternative of not hedging at all. Digital option replication is considered in Tichý (2006), where dynamic and static hedging are carried out for four different models: GBM, Hull-White stochastic volatility, the variance gamma and variance gamma in stochastic environment. For the static hedging, the author considers a concrete example by combining regular call options, simulates random paths of the underlying asset price evolution, and calculates some statistics of the terminal replication payoff error.
In this work, we consider a general setting for hedging at-the-money digital options near maturity by means of a bull spread. We solve different optimization problems, with the aim of minimizing the probability of sub-hedging the digital option at maturity, considering transaction costs and illiquidity issues. The main contributions of this paper are the following:
-
We compute the delta Greek of a digital call option under GBM and Heston dynamics for a wide range of values for the underlying asset. In the case of Heston model, the delta is obtained by means of COS method (Fang and Oosterlee 2008), which belongs to the class of option pricing methods based on Fourier inversion.
-
Given a confidence level, we determine the composition of the bull spread such that the probability of super- and sub-hedge a digital option meets that confidence level. We consider GBM and Heston models. In the case of Heston model, the probability density function for the asset price at maturity is approximated by the COS method.
-
We determine the composition of the bull spread that minimizes the probability of sub-hedging a digital option given that the cost of hedging is below a certain threshold. We consider GBM, Heston and CGMY models for driving the dynamics of the underlying asset. The COS method is used for pricing under Heston and CGMY dynamics. The optimization algorithm employed is derivative-free for all three models considered.
-
We solve the aforementioned optimization problem with a gradient based method when the dynamics of the underlying asset follows a GBM model.
-
We introduce the modeling of the illiquidity issue in the optimization problem, and solve it for the Heston model.
-
We calibrate the CGMY model to real market data and solve the optimization problem with transaction costs with the calibrated model.
The paper is organized as follows. We put forward the issues with the delta Greek for at-the-money digital options near maturity in Section 2. In Section 3, we propose a novel methodology for carrying out static hedging strategies. We show the performance of the proposed methods by means of a variety of numerical experiments in Section 4. Section 5 concludes and gives some pointers for future research.
2 Dynamic Hedging of Digital Options
Derivative dealers use dynamic hedging to adjust their positions as the underlying assets move. The hedge is often carried out several times a day. A particular case of dynamic hedging is delta-hedging. This technique consists of offsetting the risk of buying or selling options, by holding underlying in an amount equal to minus the delta of the options. When portfolios include near-the-money digital options, with a short time to maturity, some instabilities may arise that hamper the computation of the delta. We show this fact in Sections 2.1 and 2.2, where the models considered for the underlying asset dynamics are the GBM as well as the Heston model, respectively. We present the stock price model driven by CGMY process in Section 2.3, since it will be used in the numerical experiments.
2.1 Computation of the Delta of a Digital Option Under the GBM Model
A European call (respectively, put) option, gives to the holder the right to buy (respectively, sell) the underlying asset at maturity time T at an agreed price K called strike. The GBM model assumes that the price \(S_t\) of the underlying asset has a constant volatility \(\sigma\), and is governed by the stochastic differential equation,
being r the risk-free interest rate, and \(W_t\) a Brownian motion. Under this model, the valuation formulae at time t of European call and put options can be found in the seminal paper (Black and Scholes 1973). These formulae are given, respectively, by,
where,
being \(\tau :=T-t\) the time to maturity, and \(\Phi\) the standard normal cumulative distribution function.
A digital call (respectively, put) option pays nothing when \(S_T \le K\) (respectively, \(S_T \ge K\)) or pays a predetermined constant amount C when \(S_T > K\) (respectively, \(S_T < K\)), where \(S_T\) denotes the underlying asset at maturity time. Without loss of generality, we will assume that \(C=1\).
Under the GBM dynamics, the risk-neutral valuation formulae (see Chapter 25 of Hull 2012) of the digital call and put, respectively, at time t, read,
The delta of the digital call option reads,
where \(\phi\) denotes the density function of the standard normal distribution.
Since the digital option payoff is discontinuous at the strike, digital options are difficult to hedge when they are close to expiration and near the money. Around the strike, small moves in the underlying asset price can have very large effects on the value of the option, that is, the absolute value of delta can be large close to maturity. Moreover, the delta may exhibit abrupt changes as the underlying price changes when the option is close to maturity (see Fig. 1). It is common among practitioners to consider that an option is close to expiry when it remains at most ten days to maturity.
2.2 Computation of the Delta of a Digital Option Under the Heston Model
We consider now the celebrated Heston model (see Heston 1993) for driving the dynamics of the underlying asset. Within this model, the volatility, denoted by \(\sqrt{u_{t}}\), is modeled by an additional stochastic differential equation,
where \(x_t\) denotes the log-asset price variable and \(u_{t}\) the variance of the asset price process. The parameters of the Heston model are the initial volatility \(u_0\), the mean reversion rate \(\lambda \ge 0\), the long run variance \(\bar{u} \ge 0\), the volatility of variance \(\eta \ge 0\) and the correlation \(\rho\), between the two Brownian motions \(W^1_{t}\) and \(W^2_{t}\). The parameter \(\mu\) represents the rate of return.
We use the COS method (see Fang and Oosterlee 2008) to compute the delta of the digital call under the Heston model. The starting point for pricing European options with numerical integration techniques is the risk neutral valuation formula,
where v denotes the option value, \(\tau\) is the time to maturity (\(T-t\)) and \(\mathbb {E}_{Q}[\cdot ]\) denotes the expectation operator under the risk neutral measure Q. The variables x and y are state variables at times t and T, respectively, f(y|x) is the probability density of y given x, and r is the risk free rate. The COS method belongs to the class of Fourier inversion methods, and the probability density function (PDF) of the price process at terminal time T is recovered from its characteristic function, that is, the Fourier transform of the PDF.
Generally speaking, a PDF f(x) and its characteristic function \(\phi (w)\) form a Fourier pair,
For a function supported on \([0,\pi ]\), the cosine expansion reads,
where \(\sum ^{\prime }\) indicates that the first term in the summation is weighted by one-half. For functions supported in any other finite interval, say \([a,b] \subset \mathbb {R}\), the Fourier-cosine series expansion can easily be obtained via a change of variables,
It then reads,
When [a, b] is conveniently chosen, it can be shown that \(A_{k}\approx F_{k}\), where,
and \(\Re (z)\) denotes the real part of z. Finally, we replace \(A_k\) by \(F_k\) in (7), and truncate the series summation such that,
We now return to the option pricing problem (3). Because the density function f(y|x) is not known, we rely on its known characteristic function. We can first truncate the infinite domain into a finite domain [a, b], and then replace f(y|x) by its Fourier-cosine series expansion, to end up with (see all the details in Fang and Oosterlee 2008),
with characteristic function \(\phi\). The so called payoff coefficients \(V_{k}\) can be obtained analytically for European plain vanilla and digital (also called cash-or-nothing) options. Since we assume that the characteristic function of the log-asset price is known, we represent the payoff as a function of the log-asset price. If we denote the log-asset prices by,
the payoff for European options, in log-asset price, reads,
with \(\beta =1\) for a call option and \(\beta =-1\) for a put option, and then, the payoff coefficients for European call and put options, respectively, read,
where,
and,
For digitals call and put options, the payoff coefficients read, respectively,
In the case of the Heston model, the pricing equation in (10) reads,
where,
and \(\varphi (w)\) is specified in Appendix A.
The delta Greek can be obtained by computing the derivative of the option value given in expression (17) with respect to the underlying asset,
As it was observed under the GBM dynamics, the delta of a digital option under the Heston model exhibits abrupt changes of value as the underlying price changes when a near the money option is close to maturity (see Fig. 2). A remedy for the moving delta target is to avoid dynamic delta-hedging and to choose static hedging instead.
2.3 Stock Price Model Driven by CGMY Process
In this section, we introduce the CGMY process, which belongs to the class of Lévy processes. As pointed out in Schoutens (2003) Lévy processes give a much better fit to the data than the GBM model. We refer the readers to Applebaum (2004) for a more detailed discussion on Lévy processes, and Schoutens (2003) for modelling the stock price based on Lévy processes.
Definition 1
Let \(X=(X_t)_{t \ge 0}\) be a stochastic process defined on a probability space \(\left( \Omega , \mathcal {F}, P \right)\). We say that it has independent increments if, for each \(n \in \mathbb {N}\) and each \(0 \le t_1< t_2 \le \dots< t_{n+1} < \infty\), the random variables \(X_{t_{j+1}}-X_{t_j}, j=1,\dots ,n\) are independent and that it has stationary increments if each \(X_{t_{j+1}}-X_{t_j} \,{\buildrel d \over =}\, X_{t_{j+1}-t_j}-X_0\).
Definition 2
We say that X is a Lévy process if,
-
(i)
\(X_0=0\) (almost surely),
-
(ii)
X has independent and stationary increments,
-
(iii)
X is stochastically continuous, i.e. for all \(a>0\) and for all \(s \ge 0\), \(\lim _{t \rightarrow s}P(|X_t-X_s|>a)=0\).
We now have the Lévy-Khinchine formula for the characteristic function of a Lévy process \(X=(X_t)_{t \ge 0}\),
where a is the drift rate, b is the diffusion coefficient, k(x) is called the Lévy density, and completely characterizes the jump component of Lévy processes. The Lévy density of the CGMY process (see Carr et al. 2002 or Geman 2002 for the details) with parameters C, G, M, Y is given by,
The parameter C can be viewed as a measure of the overall level of activity, and it controls the overall kurtosis of the distribution. The parameters G and M control the rate of exponential decay on the right and left of the CGMY density, respectively. When they are equal to each other, the distribution underlying the CGMY process becomes symmetric. In the case of \(G \ne M\), it leads to a skewed distribution. If \(G<M\), the left tail of the distribution is heavier than the right one, whereas \(G>M\), the right tail is heavier than the left one. Finally, the parameter Y is used to characterize the fine structure of the stochastic process. This parameter determines whether the CGMY model has a complete monotone density, and whether the process has finite or infinite activity.
The CGMY model for the stock price process assumes that the martingale component of the movement in the logarithm of prices is given by the CGMY process extended to include an orthogonal diffusion component. The characteristic function for the logarithm of the stock price is given in Appendix A.
3 Static Hedging of Digital Options
Assume that we need to hedge at time t a short digital call with strike K, as defined in Section 2.1. A way of performing the hedging strategy is to build a bull call spread with value \(b_t\) at time t, composed of \(\frac{1}{2h}\) units of a long call with strike \(K-h\) and value \(c_t(K-h)\), and \(\frac{1}{2h}\) units of a short call with strike \(K+h\) and value \(c_t(K+h)\), for a certain \(h>0\),
with payoff at maturity \(t=T\),
The payoff \(b_T\) is illustrated in Fig. 3, where we have considered \(K=100\) and \(h=15\). We can observe that the super-hedging interval is \([K-h,K]=[85,100]\), while the sub-hedging interval is \((K,K+h)=(100,115)\).
We must compute h to determine the number of calls and the value of the strikes involved in the bull call spread. In Section 3.1 we calculate the value of h such that,
for a given confidence level \(\alpha \in (0,1)\) close to 1. We assume that the underlying follows either GBM or Heston dynamics.
3.1 Determining h Given a Fixed Level of Probability
We know that, under a GMB, the log-asset price \(S_T\) at terminal time T is normally distributed with mean \(\ln (S_t)+\left( \mu -\frac{\sigma ^{2}}{2}\right) \tau\), and variance \(\sigma ^2\tau\). Standardizing expression (22), we end up with,
where Z follows a standard normal distribution. Then, the value of h can be numerically obtained by solving the equation,
Under the Heston dynamics, we do not have a closed-form expression for the probability density function of \(\ln (S_{T}/K)\), although we have instead its numerical approximation given by the corresponding Fourier-cosine series expansion. Then, expression (22) turns out,
where, \(c(h)=\ln \left( \frac{K-h}{K}\right)\), and, \(d(h)=\ln \left( \frac{K+h}{K}\right)\). Finally, if we integrate the right hand side of expression (25), the value of h can be obtained by solving the equation,
3.2 Cost of Hedging and Potential Losses
We need to assess the convenience of shorting an option based on the cost of hedging, as well as on the probability of having a loss with the selected hedge. Each time we cover a digital call with a bull call spread we incur in transactional costs. We assume that the transactional costs represent a percentage \(\kappa\) of the value of the option. Then, the total cost of hedging at time t is given by,
The potential loss of hedging the digital call with the bull call spread could be replicated at time t, by shorting \(\frac{1}{2h}\) puts with strike K and value \(p_t(K)\), buying \(\frac{1}{2h}\) puts with strike \(K+h\) and value \(p_t(K+h)\), and shorting \(\frac{1}{2}\) digital puts with strike K and value \(p_t^d(K)\),
Figure 4 illustrates an increasing potential loss and a decreasing cost of hedging for increasing values of h, under the Heston dynamics.
The potential loss at maturity time \(t=T\) is described in Table 1. As we can observe, there is a loss only when \(K<S_T<K+h\) (see Fig. 3). That is why, from now on, we focus our attention on the probability that \(S_T\) lies within the sub-hedging interval \([K,K+h]\).
If we take into account the cost of hedging \(H_t(h)\) as well as the cost of the potential loss \(L_t(h)\), then the value of h in the hedging strategy can be obtained as the solution of a minimization problem with constraints. Defining,
the non-linear optimization problem can be formulated as follows,
where \(G_t(h):=H_t(h)+L_t(h)\) represents the global cost at time t of the hedging strategy, and g is a fixed threshold.
3.3 Adding the Illiquidity Cost
In this section, we present an alternative model by adding a penalty corresponding to an illiquidity cost. Illiquidity costs are common in over the counter options trading. In our case, the calls and puts with strike \(K+h\) or \(K-h\) might not be available on the open market, and illiquidity costs could arise. In Çetin et al. (2006) a theoretical framework for liquidity costs is developed. In Harr (2011) an empirical analysis based on Çetin et al. (2006) is presented for options on stocks, and the author estimates liquidity costs to be in the rage of \(10^{-3}\) to \(10^{-2}\) times the value of the option. We choose \(10^{-2}\) as a reference value for our problem. The illiquidity cost is the highest when the desired strike is in the midpoint of the two closest strikes available in the market (without loss of generality, here we assume that \(0<h<1\) and the strikes are available in a unit basis). The illiquidity penalty function is given by,
and it is illustrated in Fig. 5. The maximum penalization is \(10^{-2}\) and corresponds to \(h=0.5\).
If we define,
and,
then, the non-linear optimization problem including illiquidity costs, can be formulated as follows,
where \(\tilde{G}_t(h):=\tilde{H}_t(h)+\tilde{L}_t(h)\) represents the global cost at time t of the hedging strategy, and \(\tilde{g}\) is a fixed threshold.
4 Numerical Experiments
We start this section by determining the value of h in expression (20) that satisfies (22) for different levels of \(\alpha\) and several times to maturity \(\tau\). ResultsFootnote 1 are presented in Table 2 for GBM dynamics (by numerically solving Eq. (24)) and Table 3 for Heston dynamics (by numerically solving Eq. 26). The root-finding method used is the secant method. In both situations, the value of h is greater for longer times to maturity, meaning that the hedging strategy of a short at-the-money digital call requires less call options in these situations, and the replication of the payoff needs to be less precise. As expected, the value of h increases for increasing values of \(1-\alpha\) as well.
Now we consider the optimization problem of Section 3.2. We plot in Fig. 6 the probability P(h) and the function \(G_t(h)\) under the GBM dynamics when the time to maturity is \(\tau =1/360\).
We observe that P(h) is an increasing function in h, while \(G_t(h)\) has a minimum close to zero. This optimization problem has a non-linear objective function as well as a non-linear restriction. To solve this constrained problem, we have employed a derivative-free optimization algorithm, which does not rely on gradients, called COBYLA (constrained optimization by linear approximations), described in Powell (1994), and available within the R package nloptr. This algorithm constructs successive linear approximations of the objective function and constraints via a simplex of \(n+1\) points (n dimensions) and optimizes these approximations in a trust region at each step.
We tackle this problem by considering the GBM model, the Heston model put forward in Section 2.2, and the CGMY model of Section 2.3. The pricing of options under CGMY dynamics is carried out by means of the COS method, following expression (17) and expression (18), with the corresponding \(\varphi (w)\) specified in Appendix A. The results for different values of g are displayed in Table 4. It is worth remarking that the optimal values computed for h lead to a very small percentage of potential losses compared to the option premium (e.g. 0.14% for GBM dynamics when \(g=0.1\) and \(\tau =1/360\)).
The minimization problem in (29) can also be solved by means of an algorithm based on gradients, which is much faster than the derivative-free algorithm used. We present the solution of the problem in the case of GBM model, where formulae are available in closed form. For that purpose, we calculate the derivative of the objective function P(h),
and the derivative of \(G_t(h)\),
where,
and,
The expressions corresponding to \(c'_t(K+h), c'_t(K-h)\) and \(p'_t(K+h)\), are given by,
The results obtained with the gradient-based method of Svanberg (2002) (called globally convergent method of moving asymptotes, available within the R package nloptr) are displayed in Table 5. The outcomes agree with those values in Table 4, obtained with a derivative-free algorithm. It is worth remarking that the gradient based method is much faster than the derivative-free one. The method employs outer and inner iterations. An outer iteration starts from the current iterate \(h^{k}\) and ends up with a new iterate \(h^{k+1}\). In each inner iteration, within a given outer iteration, a convex subproblem is generated and solved. In this subproblem, the original objective and constraint functions are replaced by certain convex separable functions which approximate the original functions around \(h^{k}\). The optimal solution of the subproblem is either accepted or rejected. If accepted, it becomes \(h^{k+1}\) and the outer iteration is completed. If rejected, a new inner iteration is made, with a modified subproblem based on somewhat modified approximating functions. These inner iterations are repeated until the approximating objective function and constraint functions become greater than or equal to the original functions at the optimal solution of the subproblem. This does not imply that the feasible set of the subproblem is completely contained in the original feasible set, but it does imply that the optimal solution of the subproblem is a feasible solution of the original problem, with lower objective value than the previous iterate. Each new outer iteration requires function values and first order derivatives of the original objective and constraint functions, calculated at the current iterate \(h^{k}\). Each new inner iteration requires function values, but not derivatives, calculated at the optimal solution of the most recent subproblem.
We move on to the minimization problem presented in Section 3.3, where an illiquidity penalty is considered. Results for the Heston model are shown in Table 6. We observe that if we keep the same values of g used in Table 4, then we get higher values for h, meaning that less calls can be used in the hedging strategy and higher potential losses are expected.
4.1 Calibration of the CGMY Model
We have tackled the minimization problem associated to the hedging strategy with three well-known models (GMB, Heston and CGMY) where the parameters are taken from the literature. It is worth remarking that CGMY model is fairly sensitive with respect to the parameter Y. For this reason, we calibrate this model to real market data. Let us assume that we use a set of n different options to calibrate the model, so that \(i \in [1,n] \subset \mathbb {Z}\). Then, the calibration of the model is defined as the minimization problem,
where \(\varvec{r}(\boldsymbol{\theta })\) is the n-dimensional vector of the residuals obtained when pricing the options considered for calibration using the model parameters. That is,
where \(V(\boldsymbol{\theta }; K_i)\) and \(V^*(K_i)\), represent the model price and the market price, respectively, of the option with strike \(K_i\), and \(\boldsymbol{\theta }=(C,G,M,Y)\) is the set of parameters to be calibrated.
As for the data, we consider the set of options described in Table 7,
The calibration process gives the optimal set of values \((C^*=0.057, G^*=5.022, M^*=4.999,Y^*=1.339)\). Finally, we calculate the optimal value of h with the calibrated CGMY model to hedge a digital call on bitcoin with a bull call spread (without illiquidity costs), parameters \(S_0=49955.69, K=49000, r=0.02, \sigma =(0.66+0.759)/2\) and \(\tau =1/360\). Thus, we solve the minimization problem (29) with \(g=0.01\). The optimal value is \(h=0.01139\).
5 Conclusions
In this work, we have investigated the hedging of at-the-money digital options near maturity, which remains a challenge in quantitative finance. We carry out a hedging strategy by means of a bull spread, and solve different optimization problems, with the aim of minimizing the probability of sub-hedging the digital option at maturity, taking into account transaction costs and illiquidity issues. We perform a wide variety of numerical experiments under different asset dynamics, GBM, Heston and CGMY models. The CGMY model is calibrated to market data and used to get the optimal composition of the bull spread satisfying the cost of hedging restriction. Derivative-free algorithms are employed within the minimization problems. For the GBM dynamics, a gradient based algorithm is implemented, showing a best performance than derivative-free algorithms. In terms of ease of implementation, the GBM model is preferred, since formulae are available in closed form. For the other two models, the choice should be based on their ability to fit the real data, which in turn depends on the underlying asset. All in all, we provide a set of solutions for hedging digital options that can be potentially used in practice.
The hedging of digital options presented in this work belongs to the class of static hedging strategies, in contrast to delta-hedging which belongs to dynamic hedging strategies. Our recommendation is to start with delta-hedging when the digital option is not near the money, and check the quotes for the static hedging in the meanwhile, since it is more advantageous to buy underlying asset than options in terms of transaction costs. Then, we can switch from dynamic to static hedging when either the static hedging is cheaper or when the digital option is near the money, whatever comes first.
Future research encompass methodological innovations as well as computational improvements related to the present work. In regard to the first aspect, the problem of hedging near maturity digital options with instruments with a longer maturity may arise when the options market is not liquid. That issue is studied in Mayer et al. (2015) for European style payoffs under GBM, Heston and CGMY models. Another methodological challenge consists of finding the optimal time to switch from a dynamic to a static hedging. Related to the second aspect, gradient based methods for Heston and CGMY models might be employed to speed up computations in the optimization problems.
Data Availability
All data analysed during this study are included in this published article.
Notes
The computations were performed in R code on a personal computer with a 2.80GHz Intel Core i7-7700HQ processor and 16.0 GB of RAM.
References
Applebaum D (2004) Lévy processes and stochastic calculus. Cambridge University Press
Black F, Scholes M (1973) The pricing of options and corporate liabilities. J Polit Econ 81(3):637–654
Carr P, Geman H, Madan D, Yor M (2002) The fine structure of asset returns: an empirical investigation. J Bus 75:305–332
Çetin U, Jarrow R, Protter P, Warachka M (2006) Pricing options in an extended Black Scholes economy with illiquidity: Theory and empirical evidence. Rev Financ Stud 19(2):493–529
Engelmann B, Fengler MR, Nalholm M, Schwendner P (2006) Static versus dynamic hedges: an empirical comparison for barrier options. Rev Deriv Res 9:239–264
Fang F, Oosterlee CW (2008) A novel pricing method for European options based on Fourier-cosine series expansions. SIAM J Sci Comput 31(2):826–848
Gallus C (1999) Exploding hedging errors for digital options. Finance Stochast 3:187–201
Geman H (2002) Pure jump Lévy processes for asset price modelling. J Bank Finance 26:1297–1316
Harr M (2011) Option pricing in the presence of liquidity risk: The impact of liquidity risk in option pricing theory with a supply curve. VDM Verlag Dr. Müller
Heston S (1993) A closed-form solution for options with stochastic volatility with applications to bond and currency options. Rev Financ Stud 6:327–343
Hull JC (2012) Options, futures, and other derivatives. Eighth edition, Prentice Hall
İlhan A, Jonsson M, Sircar R (2009) Optimal static-dynamic hedges for exotic options under convex risk measures. Stoch Process Their Appl 119(10):3608–3632
Mayer A, Packham N, Schmidt WM (2015) Static hedging under maturity mismatch. Finance Stochast 19:509–539
Powell MJD (1994) A direct search optimization method that models the objective and constraint functions by linear interpolation. In: Gomez S, Hennart J-P (Eds.) Advances in Optimization and Numerical Analysis. Kluwert Academic (Dordrecht), p 51–67
Schoutens W (2003) Lévy processes in finance: pricing financial derivatives. John Wiley & Sons, Ltd
Svanberg K (2002) A class of globally convergent optimization methods based on conservative convex separable approximations. SIAM J Optim 12(2):555–573
Tichý T (2006) Model dependency of the digital option replication - replication under an incomplete model. Czech J Econ Financ 56:361–379
Tompkins RG (2002) Static versus dynamic hedging of exotic options: an evaluation of hedge performance via simulation. J Risk Financ 3(4):6–34
Zakamouline V (2009) The best hedging strategy in the presence of transaction costs. Int J Theo Appl Financ 12(6):833–860
Funding
Open Access funding provided thanks to the CRUE-CSIC agreement with Springer Nature. The research leading to these results received funding from the Spanish Ministry of Economy and Competitiveness under Grants PID2019-105986GB-C21 and PID2020-118339GB-I00.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing Interests
The authors have no relevant financial or non-financial interests to disclose.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A. Characteristic Functions
For Heston and CGMY models, characteristic functions take the form,
where, in the case of Heston model,
with, \(D =\sqrt{(\lambda -i\rho \eta w)^{2}+(w^{2}+iw)\eta ^{2}}\), and \(G=\frac{\lambda -i\rho \eta -D}{\lambda -i\rho \eta +D}\), and, for CGMY model,
where q stands for the dividend yield, assumed to be zero throughout this work.
Appendix B. Truncation Range and Cumulants
To determine the truncation interval [a, b] for the COS method, we consider,
with \(L=10\) (the authors of the COS method prescribe a value for L within the interval [7.5, 10], see Section 5.1 of Fang and Oosterlee 2008 for the details). Here \(c_{n}\) denotes the n\(^\text {th}\) cumulant of \(\ln \left( \frac{S_{T}}{K}\right)\). The cumulants corresponding to the models used in this work read,
-
GBM:
$$\begin{aligned} c_{1}=r\tau ,\;c_{2}=\sigma ^{2}\tau ,\;c_{4}=0. \end{aligned}$$ -
Heston:
$$\begin{array}{l} c_1 = \mu \tau +(1-e^{-\lambda \tau })\frac{\bar{u}-u_{0}}{2\lambda }-\frac{1}{2}\bar{u}\tau ,\\ {\begin{aligned} c_2 =&\; \frac{1}{8\lambda ^{3}}\Big (\eta \tau \lambda e^{-\lambda \tau }(u_{0}-\bar{u})(8\lambda \rho -4\eta )+\lambda \rho \eta (1-e^{\lambda \tau })(16\bar{u}-8u_{0})+2\bar{u}\lambda \tau (-4\lambda \rho \eta +\eta ^{2}+4\lambda ^{2})\\& +\eta ^{2}((\bar{u}-2u_{0})e^{-2\lambda \tau }+\bar{u}(6e^{-\lambda \tau }-7)+2u_{0})+8\lambda ^{2}(u_{0}-\bar{u})(1-e^{-\lambda \tau })\Big ), \end{aligned}} \\ c_{4} = 0. \end{array}$$(51) -
CGMY:
$$\begin{aligned} \begin{array}{l} c_{1}=r\tau +C\tau \Gamma (1-Y)(M^{Y-1}-G^{Y-1}),\\ c_{2}=\sigma ^{2}\tau +C\tau \Gamma (2-Y)(M^{Y-2}-G^{Y-2}),\\ c_{4}=C\tau \Gamma (4-Y)(M^{Y-4}-G^{Y-4}). \end{array} \end{aligned}$$
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Blanc-Blocquel, A., Ortiz-Gracia, L. & Oviedo, R. Hedging At-the-money Digital Options Near Maturity. Methodol Comput Appl Probab 25, 18 (2023). https://doi.org/10.1007/s11009-023-10013-6
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11009-023-10013-6