Using a hash function is a common way to extract entropy from non-uniform sources. Yes, the Blake2b cannot have more than 512-bit security, therefore you need to concatenate outputs of different inputs to achieve more bits.
Concatenation all of the inputs (call $m$) into one big good entropy source then getting 2048-bit can be achieved by using the hash function in CTR mode
$$key = Blake2b\big(m\mathbin\|01\big)\mathbin\| Blake2b\big(m\mathbin\|02\big) \mathbin\| Blake2b\big(m\mathbin\|03\big)\mathbin\| Blake2b\big(m\mathbin\|04\big)$$
is the common way to get desired output, or directly use XOF of SHAKE256.
There is also; chaining;
\begin{align} h_0 &= \operatorname{Blake2b}(image_0)\\
h_i &= \operatorname{Blake2b}(image_i\mathbin\| h_{i-1}))
\end{align}
Here, you need to guarantee that the images are different. If not, knowing the first image will guarantee that the attackers will get the rest. So, the security is reduced. Stick the CTR mode or use XOF.
While 256-bit is enough for all to encrypt even against quantum adversaries, make sure that your input files carry enough entropy from the sources that they are taken. If the image repository is highly limited or the images have few variations, you may end up with bad entropy.