The image on the right half is a picture from the “unsolved” #Cicada3301 Liber Primus puzzle of 2014.
You can see a similar set of hex embedded into the Cicada image.
Even stranger, the other 2 images were BIG: 1.6Mb and 1.8Mb.
That didn’t make sense.
To my surprise, not only did ALL 3 of them have a little bit o fishyness to them (some hex and stuff in the EXIF), but one of the files seems to have a PGP key embedded using OutGuess!!
If you’re a follower of the “Q boards”, you probably know there are numerous instances of #steganography being used.
Here’s some possible appended data on a Q post:
If you remember last July, there was a photoshopped pic of Sarah Silverman that alluded to using PixelKnot (F5 Stego).
Point being—Steganography is pretty common.
I ran a number of tests with OutGuess, Steghide, and a few others Steganography tools, then tested the detection & extraction of “controlled” files (ones I KNEW had data, and ones I knew didn’t)