At the very least, store your password manager's account password into an encrypted zip file that you remember the password to on a cloud service (With 2FA of some sorts) or a Bitlocker encrypted flash drive.
At least that sounds a hell of a lot more sane than some steganography stuff involving image files and external PC tools that could easily fail at any time. Thor's method for saving passwords sounds needlessly obtuse.
Entropy protects your password better than complexity. Longer and memorable is better than more complicated. This alone does a lot to keep you secure so long as you don't reuse passwords as most attacks are either dictionary attacks or brute force. Almost all others are due to a service becoming compromised.
Mind you, with all the passwords we need in current year you're best off relying on an algorithm that reliably produces the same password everything when fed the same input, and using what that password is for as the input. Ideally one you can run without fancy code, just follow the steps in your head or with a pen and paper.
Just to come up with one now, (no I don't use this, I use a way lazier algorithm) take your full legal name as your password, that's likely reasonably long enough to be functional. Separate each word with your favourite keyboard symbol. Count the letters in the web domain and shift it by that much with a Caesar Cypher. End it in your birth year. So John Smith who is 20 years old would have the following password for kiwifarms:
Sxqw$Bvrcq$2004
. John Smith can always get this password for kiwifarms even if he forgets it and doesn't need to rely on his password manager. It's unlikely he's going to reuse his passwords too many times since websites have different lengths which makes them unique. He doesn't need to remember specific passwords. He doesn't need special files or special software. He just needs a Caesar Cypher solver website to speed it up, or he can shift the alphabet by hand. Brute force attacks will fail to be expedient enough to be a threat. Anyone without a sufficient number of data to see there is a pattern related to password length always being the same as well as certain common elements, or anime protagonist levels of logical leaps, won't be able to figure out what the algorithm is to get into things. John Smith is safe. John Smith is never at risk of a compromised password manager. John Smith isn't fucked if his computer explodes. John Smith can log into anything from any computer and doesn't need something found only on his home computer.
Meanwhile someone like Jason is fucked if he loses his porn folder.
Better yet, just get a pad of paper and a pen and be a boomer. Your house is more secure than any computer system and doesn't lock you out because you're too drunk to do some weird steps to figure out your own riddles. If you care enough to actually have proper security though an algorithmic approach is safer than any password manager or weird method of storing passwords in other data types. I used to do encrypted passwords hidden inside audio files. Then I had to sign into something from somewhere other than my usual home PC after a motherboard failure. I learned then that a password isn't just to keep other people out, but to let me in and stumbled my way into algorithmic password generation. Now that I've migrated every account over to my algorithm I never find myself unable to get into an account without needing to go through some complicated software solution to hide passwords.